• After 15+ years, we've made a big change: Android Forums is now Early Bird Club. Learn more here.

Root **Official** Droid X encrypted bootloader and efuse thread

Well this sucks... Assuming I end up not getting the X or end up returning it, what would be the next best Android phone? The Droid 2 is probably going to be the same as well as any/most motorola devices in the future. The Fascinate suffers from being a Samsung phone. What's next? I'm hoping to get a new phone by September when I'm off to college, but I'm willing to use a RAZR until the end of the year if future phones look promising.
 
who doesnt want a good challenge from time to time? if you break it you become a hero in the droid community.

also if it helps any, there was a thread with pictures of a dissembled droid and stating that it really was not that hard, it just requires a t4 screwdriver.

it seems like only die hard fans want the droid x to be hacked so im sure if it came down to it they might consider it if they had a very good and reliable tutorial to follow along with. look at the xbox 360 and all the people who were willing to take apart there 360 and flash it.

but thats just a start, we can build off of this, there are phone hackers out there saying its possible. they say its hard but thats what they want! they want something to do for the next few weeks that would make them famous in the droid community! now I myself being a Xbox 360 hacker/flasher have developed enough motivation to start and gather information on flashing the droid x! I'm going to go ahead and start studying a procedure in my eyes that would work.

also another thing to look at is the usb port, there may be a way to gain access to the roms through the usb port in order to flash it. it wont hurt to look into it, as the hdmi port to me would seem unlikey to aid us in any way but who knows.

ill collect some info and post what i have found here as i get it!


memorizing a guide to flash 360s doesnt make u a 360 hacker
a 360 flasher i guess but i dont see droid x bootloader being hacked without taking phone apart
 
Think about this, with a rumored android 3.0 release on the horizon, what if Motorola decides they will not upgrade the Droid X. With a device without the ability to install custom roms, it just went from one of the best devices to have to possibly one of the worst. (assuming gingerbread will be as great as we think) The perfect example is the G-1. My G-1 would be absolutely irrelevant if not for custom roms. But with them, I still have a phone that has convinced 4 previous iphone users to switch to android. My g-1 is better than newer phones that people have chosen not to modify! I think any previous g-1 owner can attest to the absolute necessity of custom roms! I say screw locking the phones down. Keep the spirit of andoid alive!
 
I'm all for new methods of hacking but JTAG simply isn't something you can do without taking apart your phone and finding the ports for it.

Is it feasible to create some sort of "mod chip" type solution that is hardware based to bypass the encrypted bootloader altogether? I opened up my playstation and soldered a mod chip in there and I knew probably less than the 17 year old girls referenced in other parts of this thread at that time.

I'd be happy to solder a little mod chip into my phone if it gave me full access...
 
You shouldn't have to solder a chip into your "open" OS phone.
------
How many people here will withhold buying the X? If people are complaining and then go ahead and buy it then there's no point in us even having this discussion.
I won't buy the X; I've waited a long time for a phone and I can wait a bit longer. I'll go with WP7 if I can't get an accessible phone.
 
You shouldn't have to solder a chip into your "open" OS phone.

What does the fact that Android is an open source OS have to do with anything? The fact is that Motorola has locked down the bootloader which is definitely not open source.

Like it or not, Motorola has every right to lock down and encrypt their hardware and customized software.
 
The Droid X uses TI's OMAP 3630 system on a chip. I was hoping for Motorola to have written their own DRM, but it turns out that model uses TI's M-Shield technology. I'm still trying to wrap my head around the OMAP tech specs, but it looks like there's nothing but a whitepaper, for M-Shield. I suspect that's because they reserve that for their high-volume customers, and DRM relies entirely on security by obscurity.

Unfortunately, I have enough faith in TI that I suspect they properly implemented the cryptographic signing, so I only see two realistic attacks. First, RSA keys require large, hard-to-factor prime numbers, and for performance reasons probabilistic primality tests are used. It's more likely that one of the "prime" numbers used isn't, than someone cracking normal RSA 2048 (equivalent to brute-forcing 112 bit symmetrical encryption keys, according to RSA). Alternatively, RSA can use either MD5 or SHA-1 to sign things. SHA-1 is collision resistant, but MD5 is less so. The OMAP supports either hashing algorithm, so if Motorola picked MD5 it's possible one can make a custom firmware that has the same hash (and subsequently RSA signature) as an offical firmware. So the bootloader would accept the custom firmware without being able to tell that it isn't from Motorola.

As for mod-chip/hardware based attacks... I fear that the hardware is physically tamper-resistant. It's probably all in the same microchip, so there are unlikely to be any contacts to connect to. Now, there is no tamper-proof hardware, but this raises the bar such that, to my knowledge, there's basically one person that broke it as a proof-of-concept. OTOH, homomorphic encryption isn't practical yet, so hardware attacks are still theoretically unstoppable.

What I'm trying to figure out right now is where the first stage bootloader is located. The first stage bootloader is where the OMAP starts executing instructions contained on flash, and if we can overwrite it then we can ignore M-Shield all together. Sadly, I think it's in the "secure rom" part of the chip. If so, that makes it a pain. OTOH, a lot of OMAP chips don't even use M-Shield, so hopefully there's a way to use a first stage bootloader located somewhere else. This might require a hardware hack, but it's probably not impossible to use software to accomplish the same feat. Also of note is that M-Shield is almost certainly used for SIM locking and DRM, so bypassing it might mean we need to re-implement the former to keep the cell phone on Verizon's network. The latter is why I suspect the Droid X uses M-Shield at all, since, IIRC, Blockbuster has some application pre-installed to watch overpriced movie rentals.

Right now I don't know enough to comment intelligently on this matter, but I figure someone might be able to make use of what I've dredged up so far. IMHO, cracking the bootloader is akin to focusing on the carbon nanotube reinforced steel 64 pin padlock securing the wooden door on a grass hut. Running your own linux variant doesn't really require flashing a new firmware using the bootloader, though that's the more traditional approach with phones. Or at least that is what I think for now. Recall that I'm worse than a newbie since I won't even have a smartphone of any sort, ilk, or kind for at least another day.
 
@izomiac,
"worse than a newbie".... LOL! Not even close izomiac! Reading that post just made me all sorts of happy and confused at the same time. CRPercodani's post is 110% correct.

@CRPercodani,
If I knew how to properly direct izomiac to the places he could help most, I would do it in a heart beat. Unfortunately, my best advice is "um... xda?". I have a feeling you know your way around the modding/hacking/call-it-whatever-you-want Android community better that I: I'd like to suggest that you contact izomiac privately and help him/her find the places that could benefit from his input the most (aka really understand what he's saying and respond). I think a lot of AF members are really happy to see that sort of post, but the best that a lot of us can do is nod, smile and applaud. You catchin what I'm throwin here?
 
We might be better off searching for root in 2.2 when it comes since we wouldn't be able to flash anything after obtaining root and risking losing root again. That way we at least have the benefits of 2.2 like the JIT compiler.

The Droid Incredible method was pretty cool, basically getting adb to run in recovery and then pushing an update file right after the loader checks the signature on a valid image.

There is also the possibility that wifi tether will work on the droid as is. Maybe the iptables are setup properly because verizon has their wifi tether app installed. That's a minor item though. Just a sad direction for all computing devices. One day we won't have admin on any of them.

Then again, this phone is coming from the makers of the backflip that was locked to the android market (sort of).
 
Back
Top Bottom