First small steps toward free GSM firmware

kardan kardan at
Sat Nov 16 00:03:33 CET 2013

Am Fri, 15 Nov 2013 02:17:48 +0100
schrieb joerg Reisenweber <joerg at>:

> [quote]
> Lastly, the baseband processor is usually the master processor,
> whereas the application processor (which runs the mobile operating
> system) is the slave. [/quote]
> Nothing more to say. This article isn't worth the CPU time to render
> it on my screen.
> You can hack and exploit the baseband as much as you like, it stays
> baseband can can do nothing it couldn't do anytime on any location in
> the network. IOW, don't worry about what's going on in your modem.
> It's even less interesting than what's going on in your harddisk of
> your PC. Since the harddisk could actually introduce a infected
> bootloader or kernel to your system, the modem is sth you rarely ever
> boot from. ;-P

I don't get you (or got you wrong). The article says (which indeed is
no news), that the baseband can be easily exploited which affects
the applications you are running (or are started / installed remotely).

Please tell me, I am wrong.

Kardan <kardan at>
Please encrypt emails to me.
Public GPG key 9D6108AE58C06558 at hkp://
fingerprint: F72F C4D9 6A52 16A1 E7C9  AE94 9D61 08AE 58C0 6558

* EU data retention since 2006
* NSA/GHCQ soak up all they can into their data centers
* orwell 2.0: Stop Watching Us!
> software for informational self protection

"everyone has the right to know who is knowing what about him at what
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 620 bytes
Desc: not available
URL: <>

More information about the community mailing list