Getting Custom Kernels Running on the Droid X

PalmerCurling

Premium Member
Premium Member
Developer
Joined
Dec 14, 2010
Messages
217
Reaction score
0
Sorry. Got excited. :D


Hey guys, site is live.

Project Bootloader Freedom created by palmercurling

In other news, I'm thinking about writing a program to spam e-mails to Motorola asking for the key. :D Haha. Kidding. :D

Thank you for beating me to posting my own website! XD



Sent from my DROIDX

Not a problem, I've been fending off snow all day. Site is basic, mostly a hub to aliasxerog's stuff. Also has links to downloads he posts, and ill add some information as we continue work.
 

furbearingmammal

Super Moderator
Joined
Jun 16, 2010
Messages
11,081
Reaction score
363
Location
Anywhere you're not
Website
swdouglas.blogspot.com
Current Phone Model
32GB Moto X Developers Edition
Twitter
furryvarmint
LOL!

I just had a brilliant idea I'm giving to you guys to chew over and then laugh at me for having.

Distributed computing method. Brute-force hacking attack via BOINC.

[Disclaimer -- this abuse of the BOINC system is not actually being endorsed, merely offered as a "if only, ha ha!" comment.]
 

Sarg338

Member
Joined
Jan 8, 2011
Messages
34
Reaction score
0
LOL!

I just had a brilliant idea I'm giving to you guys to chew over and then laugh at me for having.

Distributed computing method. Brute-force hacking attack via BOINC.

[Disclaimer -- this abuse of the BOINC system is not actually being endorsed, merely offered as a "if only, ha ha!" comment.]

My liege, you have my computer.
 

PalmerCurling

Premium Member
Premium Member
Developer
Joined
Dec 14, 2010
Messages
217
Reaction score
0
LOL!

I just had a brilliant idea I'm giving to you guys to chew over and then laugh at me for having.

Distributed computing method. Brute-force hacking attack via BOINC.

[Disclaimer -- this abuse of the BOINC system is not actually being endorsed, merely offered as a "if only, ha ha!" comment.]

I hate BOINC. It messes up all of my computers. For a noble cause such as this, to heck with quality internet. Give me a phone that can do what I want when I want. And I want cyanogenmod.
 

ClumsyNinja21

Premium Member
Premium Member
Developer
Joined
Jun 15, 2010
Messages
743
Reaction score
0
Location
Chicago
For all the star power that has taken a crack at this thing, I sincerely hope you guys do it. Instant legends. Forever written in the Android history pages. :)

Sent from my DROIDX using DroidForums App
 

KHeeney5

Member
Joined
Nov 28, 2010
Messages
544
Reaction score
0
If you went over to XDA and got all developers for the X and all the developers here for the X and even the D2 just to give an idea and try to help out, I feel like that would help a lot. :)
 
OP
aliasxerog

aliasxerog

Premium Member
Premium Member
Developer
Joined
Oct 24, 2010
Messages
178
Reaction score
0
I just thought about this, but why don't we do a cold-boot attack. I'm thinking the key has to be saved in ram at some point during boot. I doubt, though, someone wants put their phone in liquid nitrogen.

It's time to blow this scene...
 

KHeeney5

Member
Joined
Nov 28, 2010
Messages
544
Reaction score
0
I just thought about this, but why don't we do a cold-boot attack. I'm thinking the key has to be saved in ram at some point during boot. I doubt, though, someone wants put their phone in liquid nitrogen.

It's time to blow this scene...

What? Lol.

Sent from my DROIDX
 
OP
aliasxerog

aliasxerog

Premium Member
Premium Member
Developer
Joined
Oct 24, 2010
Messages
178
Reaction score
0
I would Google that one, it would be a pain to type on my Droid.

It's time to blow this scene...
 

KHeeney5

Member
Joined
Nov 28, 2010
Messages
544
Reaction score
0
I would Google that one, it would be a pain to type on my Droid.

It's time to blow this scene...

Sounds good. :)


"In cryptography, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer is able to retrieve encryption keys from a running operating system after using a cold reboot to restart the machine from a completely "off" state. The attack relies on the data remanence property of DRAM and SRAM to retrieve memory contents which remain readable in the seconds to minutes after power has been removed"
 

kicker22004

Member
Joined
Aug 20, 2010
Messages
31
Reaction score
0
I'm glad to see this picking up steam, Fast question what do you mean we had the 30.03 key? and that it didn't help?
 

PalmerCurling

Premium Member
Premium Member
Developer
Joined
Dec 14, 2010
Messages
217
Reaction score
0
The bootloader has some encryption keys to check that the kernel being booted is okay (in this case, only Motorola's kernels will work). we had the keys for the last veersion of the bootloader, but it still didnt work.

is it possible that multiple keys exist, for different parts of the boot process? just tossing some thoughts that have come to me on another wonderful snow day. yay sleep madness.
 
OP
aliasxerog

aliasxerog

Premium Member
Premium Member
Developer
Joined
Oct 24, 2010
Messages
178
Reaction score
0
It's probably asymmetricly encrypted.

It's time to blow this scene...
 
Top