gregeric wrote:jamesh wrote:You are about 4 years late to the party.
I know it can be tiresome to repeat things, but the ongoing success of the Pi means it will attract new users like 321a over and over. I remember the time I first read about the fascinating internals of the Broadcom chip, the same intrigue I imagine 321a is feeling right now.
I've been using the pi's for a few years now, skipped the A's but started with the B's, the main problem is information overload or not seeing the information.
Having read a court document between the police and a uk software company, they had to describe in the court documents the processes with obtaining forensic data from phones. The steps were succinct and straight to the point, I guess they had to be in order for a judge to even understand the process.
Then having seen this thread today, I wonder whether it would be possible to rig up a device which feed data to the chip. It would be time consuming, but the chip might not have anything built in which would disable itself after so much garbage has been sent to it.
So like you can get a shim device which fits between the sata/(e)ide ports on a motherboard and hard disk in order to extract the passwords manufacturers use to encrypt drives and other data, I also wondered if some sort of device exists which could be plugged into a microSD slot/SD card adapter where you could then emulate an SD card, feeding data ultimately to a RPI.
If such a device existed, then it would be possible given enough time or resource to reverse engineer any chip which doesnt shutdown after X number of failed attempts.
I dont have time, but making a device which fed data to the videocore chip based on best guesses would be how I would approach it. Of course, until tried cant say if it would work, but feeding what was known to work would be the first test of such a hypothetical device.