- cross-posted to:
- technology@lemmit.online
- cross-posted to:
- technology@lemmit.online
Buchanan walks through his process of experimenting with low-cost fault-injection attacks as an alternative when typical software bugs aren’t available to exploit.
Buchanan walks through his process of experimenting with low-cost fault-injection attacks as an alternative when typical software bugs aren’t available to exploit.
The modder in the article mentioned that the method could be used to break copyright protections on game consoles, can someone explain that?
I assume this doesn’t apply to consoles or harware that verify keys over the network, since the decryption key isn’t stored on the device itself? This is more for things like Blu-ray players or consoles that read physical media, right?
I’m a hobbyist so sorry if that’s a dumb question