So North Korea apparently has an android phone with basically a rootkit on it, that doesn’t allow you to open anything not signed by it on it, takes screenshots periodically and stuff.

Now assume you just wanna get around this, and have tools available, how do you do it?

Would you need to solder a new memory there? Could you try some sort of exploit first?

https://youtu.be/3olqrQtjPfc

  • Nikls94@lemmy.world
    link
    fedilink
    arrow-up
    2
    ·
    10 hours ago

    Excuse me if the following question is very dumb, but if there’s even custom hardware on these phones, like a chip that does this screenshotting, wouldn’t flashing on a new OS do nothing against that?

    • DahGangalang@infosec.pub
      link
      fedilink
      arrow-up
      1
      ·
      6 hours ago

      Hard to say. I expect its more likely that you’re right than wrong, but that’s not to say it’s definitely that way.

      So I’m not 100% certain this is how it would act, but them having a separate chip for screenshots - like, what does that mean? So I see two possibilities: a hardware subsystem Frankensteined onto an existing phone; or a separate SOC that exists within the phone’s frame for monitoring.

      For the Frankenstein’s version, it’d probably basically be a timer, minor image processing (to read the screen), and a small memory store (to keep data from screen caps). It’d probably route instructions through the phones CPU. I don’t know thats flashing your OS would prevent this from operating, but that’s where I’d start in trying to bypass it.

      For the separate SOC, yeah you’re fucked. Maybe you can bust open the frame and remove it…lol, but good luck without the internet handy.