
On 29 July 2013 15:31, nic <nic@404ed.org> wrote:
I've not investigated this sort of update before, but based on the little I grasped from your email I'd be interested to learn more about how, when, and why these updates are deployed.
http://en.wikipedia.org/wiki/FOTA_(technology) http://en.wikipedia.org/wiki/FUMO http://en.wikipedia.org/wiki/OMA_DM The above is ok for a very basic overview of the updating process allowing updating of the baseband via a number of ways.
Below is focussed on exploiting the baseband rather than a malicious update its interesting given this was a non-nation state attacker, so they did not have the advantage of a "relationship" with a carrier/operator
https://www.usenix.org/system/files/conference/woot12/woot12-final24.pdf
Thanks for the links. According to http://en.wikipedia.org/wiki/OMA_DM, it only applies to certain phones. Only one really old Android phone appears in the list. Are you sure this is an issue? Yes, more companies are listed under http://en.wikipedia.org/wiki/FOTA_(technology), however I think this is a more generic thing, and probably applies to the Android updates. -- Brian May <brian@microcomaustralia.com.au>