summaryrefslogtreecommitdiff
path: root/content/0022-about-the-asn.1-vulnerability.html
diff options
context:
space:
mode:
Diffstat (limited to 'content/0022-about-the-asn.1-vulnerability.html')
-rw-r--r--content/0022-about-the-asn.1-vulnerability.html12
1 files changed, 6 insertions, 6 deletions
diff --git a/content/0022-about-the-asn.1-vulnerability.html b/content/0022-about-the-asn.1-vulnerability.html
index f3ae90d..f1828e2 100644
--- a/content/0022-about-the-asn.1-vulnerability.html
+++ b/content/0022-about-the-asn.1-vulnerability.html
@@ -86,9 +86,9 @@
<p>In
our <a href="https://neo900.org/news/paypal-resumes-neo900-sources-again">last
- communication</a> we noted that <q><strong>Neo900 is the only
- phone that provides a hardware protection from remote
- activation of the baseband chip</strong></q>.</p>
+ communication</a> we noted that <strong>Neo900 is the only
+ phone that provides a hardware protection from rogue behavior
+ of the modem</strong>.</p>
<p id="anchor-gta0x">In fact, the
<a href="#note-gta0x"><strong>GTA0x</strong> design</a> contains
@@ -100,9 +100,9 @@
<li>the modem and the <abbr>CPU</abbr> <strong>do not share
<abbr title="Random Access Memory">RAM</abbr>, which
prevents a whole range of attack vectors where a rogue
- baseband chip, either by design, by "lawful", or by illegal
- action, could take control of memory segments pertaining to
- other subsystems and inject malicious code.</li>
+ modem, either by design, by "lawful", or by illegal action,
+ could take control of memory segments pertaining to other
+ subsystems and inject malicious code.</li>
</ul>
Neo900 takes advantage of this and incorporates circuitry to
give the <abbr>CPU</abbr> the capacity to monitor: