View Single Post
Old 06-21-2016, 07:21 PM   #6
geekmaster
Carpe diem, c'est la vie.
geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.geekmaster ought to be getting tired of karma fortunes by now.
 
geekmaster's Avatar
 
Posts: 6,433
Karma: 10773670
Join Date: Nov 2011
Location: Multiverse 6627A
Device: K1 to PW3
Quote:
Originally Posted by SKK View Post
Any way that doesn't involve Taking the kindle apart.
There is no known way besides connecting to the serial port inside, at this time. Amazon calls what you want to do a "downgrade attack", and they have added code to the firmware to prevent that via non-invasive mechanisms. It would take discovering a vulnerability (i.e. software "mistake") to exploit, before we can downgrade firmware without a serial port connection. Not impossible, but not easy either.

When I jailbroke my PW1 immediately after I got it (being one of the first people to get one), NiLuJe called it "not a 0-day, more like a -150 day". That was clearly a mistake from lab126, because it exploited a simple "tarbomb" vulnerability they had already fixed in the K5 firmware multiple versions earlier.

Though lately, they have been getting really secure, which makes it look like they might have an aspie programmer (i.e. technology addict) on their staff at lab126.

Last edited by geekmaster; 06-21-2016 at 07:31 PM.
geekmaster is offline   Reply With Quote