I love how Android phone manufacturers are like, "we prevent you from taking control of your own device because of security", and then proceeds to leak their own platform certificates so that any malware can gain android.uid.system privileges.

Follow

@PeterCxy Do we know that the keys were leaked (as opposed to misused)? I've seen reports of malware that was signed with them only.

@robryk@qoto.org Well it spans multiple manufacturers and SoC vendors so I don't see it as misuse, at least not so likely...

@PeterCxy It does span multiple different signing keys (is this what you meant?). Why does this make it more likely that some attacker managed to exfiltrate all those keys as opposed to an attacker managing to get something signed with all of them?

@robryk@qoto.org Sorry I misunderstood "misuse". Yes, it is entirely possible that someone was just able to get something signed with all of them.

Sign in to participate in the conversation
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.