We hacked Rabbit R1 and found THIS

  Рет қаралды 107,135

Cybernews

Cybernews

Күн бұрын

Пікірлер: 262
@cybernews
@cybernews 4 ай бұрын
What other device should we try and research? Subscribe for more #cybernews
@Data_Rogue
@Data_Rogue 4 ай бұрын
Not exactly a device but Building Access Control systems would be interesting
@Kanonenwind
@Kanonenwind 4 ай бұрын
I mean, based on this, you really should investigate what other devices with mediatek chips are vulnerable. I didn't have any faith in a scam product being safe, but if this vulnerability still works on current TVs or phones, I'd rather it be reported on.
@ismayonnaiseaninstrument8700
@ismayonnaiseaninstrument8700 4 ай бұрын
@@KanonenwindDunno if or why YT deleted my reply, but yeah, a lot of Android-related companies use Mediatek chips, from OnePlus, Huawei, Xiaomi, and Oppo to Lenovo, through their Chromebooks, and Samsung Galaxy's A13 and A14. In particular, the A14 uses the MediaTek MT6769 Helio G80 chip, and it's been around since 2023. It's a real shame, 'cause I was considering switching over to Samsung, but clearly I can't if I gotta worry about crap like this...
@a.a.panchev17
@a.a.panchev17 4 ай бұрын
Fliper zero
@RPG_Guy-fx8ns
@RPG_Guy-fx8ns 4 ай бұрын
KZbin deleted my reply.
@jaybrooks1098
@jaybrooks1098 4 ай бұрын
A physical hack through a debug port is not exactly the greatest heck of all times
@akostadinov
@akostadinov 4 ай бұрын
Also why shou;dn't consumer have access to the debugging port?? Right to repair anybody? Why shouldn't I be able to use my own device for whatever I want?
@JamesR624
@JamesR624 4 ай бұрын
Also love how they put out this video like as if it's new. Dude, EVERYONE already knows it's a cheapo android phone running an app. You didn't "hack" anything. You plugged a cable into what was essentially the cheapo phone's USB port, and transferred data.
@foxonboard1
@foxonboard1 3 ай бұрын
@jaybrooks: The exploit they used works over USB not de debug ports, they are secured good enough and are within the device @akostadinov: Because, if they are, any security can be bypassed by anyone, including bad actors. Would be comparable with running around with a phone without passcode… @JamesR624: They had to wait with going puplic after informin rabbit, else rabbit could have and would have sued them. It is normal USB connection, but you can gain root right like this and bypass any password/encryption of any user on the device and thus you are able to install hidden stuff. They mentioned, that they use a bug already found for those chip. So what they did, is discovering that thi exploit is working as well on rabbit HW.
@SimoneCangini
@SimoneCangini 4 ай бұрын
Looking at a serial port with a multimeter is like taking time at the Olympics with a sundial
@AUATUWVSH
@AUATUWVSH 3 ай бұрын
you need to check for the correct voltage level (1.8v, 3.3v, 5v) but also the TX pin will fluctuate if its trying to speak to the outside world, so its a fast way of checking if anything is trying to say anything over the UART port before hooking it up to the adaptor
@SimoneCangini
@SimoneCangini 3 ай бұрын
​@@AUATUWVSHThe fast way is called oscilloscope
@ronnyspanneveld8110
@ronnyspanneveld8110 4 ай бұрын
So you did not "hack" anything and found "nothing" :P Guy hypes up but its just another script kiddo :P
@Emayeah
@Emayeah 4 ай бұрын
imagine having to rewrite the entire exploit if there is already one
@sims234ify
@sims234ify 4 ай бұрын
basically sums up the whole concept of this channel. uninformative and superficial clickbait videos
@Emayeah
@Emayeah 4 ай бұрын
@@sims234ify tho I have to agree the video was extremely diluted
@shambles9
@shambles9 4 ай бұрын
my thoughts exactly, what is this garbage channel?!
@michaelgleason4791
@michaelgleason4791 4 ай бұрын
Yeah and then hyped themselves up for another incredibly boring 10 minutes. At least I used 2x.
@djksfhakhaks
@djksfhakhaks 4 ай бұрын
I find it hilarious that anyone took this guy seriously after his nft pump and dump.
@R1L1.
@R1L1. 4 ай бұрын
on god bro, the moment is saw that shit i went form 99.99 to 1000% sure this guy is complete fraude. At least this time a product came out lol, cant say the same for the nfc or whatever he sold.
@djksfhakhaks
@djksfhakhaks 4 ай бұрын
@@R1L1. At that point. If you get pownd, that's your fault.
@djksfhakhaks
@djksfhakhaks 4 ай бұрын
@JohnathanDHill so you think that due to your lack of research we should all suffer.
@dafoex
@dafoex 4 ай бұрын
I'd take him seriously. A crime they might be, but a pump and dump has worked in the past, so he's not an idiot in that regard.
@dafoex
@dafoex 4 ай бұрын
@@djksfhakhaks I feel you're putting words in his mouth there. >so you think that due to your lack of research we should all suffer. What do you expect he do with his lack of knowledge? Warn people that it's a scam based on no evidence?
@Lucas-wp1ju
@Lucas-wp1ju 4 ай бұрын
10:30 to only say that the chip has got a vulnerability. C'mon..
@xipi4595
@xipi4595 4 ай бұрын
10min video for a one liner
@jsalsman
@jsalsman 4 ай бұрын
This content is interesting but the delivery style is way too over the top. You don't have to act like you're doing an informercial.
@laxis96
@laxis96 4 ай бұрын
Yeah, it's also oversensationalizing the whole situation... They opened an embedded device and found the TX/RX pins of a debug UART which literally 95% of all embedded devices have. Then they found a 5 years old MediaTek exploit that requires physical access, and went on to spread fear against MediaTek... yeah MediaTek is not the best SoC company but that's all this video accomplishes? These guys have no idea what hardware hacking is...
@ciklop4206
@ciklop4206 4 ай бұрын
It's content for the unwashed masses lol
@Emelin-cr8nc
@Emelin-cr8nc 4 ай бұрын
I totaly agree with you! This video was all over the top
@DaggaRage
@DaggaRage 2 ай бұрын
agree.
@rethardotv5874
@rethardotv5874 4 ай бұрын
Breaking News: A device is exploitable, given unlimited physical Access.
@4bSix86f61
@4bSix86f61 4 ай бұрын
The rabbit R1 ain't nothing but the spotify car thing on steroids. Wait until the day they end support for it.
@leonidas14775
@leonidas14775 4 ай бұрын
And like the Ouya, its still going to be overpriced on the secondhand market for what it is because it was such an infamous flop.
@R1L1.
@R1L1. 4 ай бұрын
Ah yes mediatek, the most disgusting chip company ever. These people will literally make actual human shit if they could sell it to you.
@leonidas14775
@leonidas14775 4 ай бұрын
Why? not every cheap tech product that needs a cpu needs a good cpu. If anything, their insecure chips are a blessing if you want to root a budget phone
@nijamkaj
@nijamkaj 4 ай бұрын
@@leonidas14775 True
@MrTweetyhack
@MrTweetyhack 4 ай бұрын
@@leonidas14775 keep buying insecure everything because it's cheaper
@exapod23
@exapod23 4 ай бұрын
They choose Mediatek because is the only logical and commercially viable option for this kind of devices.
@NeedaNewAlias
@NeedaNewAlias 4 ай бұрын
You did not hack anything. People are running Linux in that R1.
@_OS_
@_OS_ 4 ай бұрын
But this vulnerability can be used before any operating system loaded. I have this vulnerability on my phone. I use it to modify firmware, because it is only way how to modify firmware on my device without memory desoldering. With this exploit I have full access to memory, everything can be replaced in firmware. Connecting off device through usb enougth to use this exploit.
@ardent3070
@ardent3070 4 ай бұрын
Important thing to note: This doesn't tangibly affect the security of the device, only the end-user's ability to modify it. If a device software were modified by a third-party, this would require the bootloader to be unlocked, which would then launch an error message regarding such upon every single startup, alerting users to potential modification. If the device is AVB (Android Verified Boot) 2.0 compliant and supports avb_custom_key, it can be re-signed with another key (something I have only seen in Pixels and select OnePlus and Motorola devices), however it will still notify the user that it is loading a separate operating system. Any Android 10+ device is also mandated to be encrypted for Play Services certification, which may not apply to this device anyway, but this means if the bootloader were unlocked, it would dump the encryption key and force a factory reset, rendering the data effectively useless. It's about as much of a danger as Qualcomm's EDL mode.
@Jeff-ss6qt
@Jeff-ss6qt 3 ай бұрын
This exploit shouldn't even be able to be used to read or modify user data either, since that's often encrypted by default. The most they'd be able to do is get an encrypted blob to put on an emulator or other device, they'd still need the pin, pattern, or password as the other part.
@ardent3070
@ardent3070 3 ай бұрын
@@Jeff-ss6qt Yup, hence why it doesn't really matter too much. One could argue it makes the process easier though, but no software is gonna stop someone from pulling the nandflash if they really wanted to lol. This vuln is a huge win for the consumer tbh
@Atropos-Lachesis
@Atropos-Lachesis 4 ай бұрын
So uhh, whats an example of the vulnerability besides the debugging port?
@DirtyPlumbus
@DirtyPlumbus 4 ай бұрын
It's entirely hackable.
@Jeff-ss6qt
@Jeff-ss6qt 3 ай бұрын
If you watch the video, they're just saying what they went through and tried before finding the actual vulnerability. The vulnerability is the MediaTec chip, which allows you to modify the firmware or replace it entirely without any issue.
@lbochtler
@lbochtler 3 ай бұрын
access to the debug port is something that everyone should have, as well as the tools to debug any and everything. The entire schematics should be public so that it can be repaired.
@donpalmera
@donpalmera 4 ай бұрын
You didn't hack anything. You found a serial port that wasn't enabled, then tried someone else's exploit and found it still works.
@MrTweetyhack
@MrTweetyhack 4 ай бұрын
and he made a video out of it to make money scam
@EXEC_A
@EXEC_A 4 ай бұрын
Well, if I break into a house by picking a lock, a > 200 year old trick, can I argue that I never broke into the house because it's already been repeated before?
@Ne-vc5pm
@Ne-vc5pm 4 ай бұрын
​@@EXEC_A your analogy is flawed, here is a better one: someone shows you what tools are needed and exact movements to pick a lock, you pick a lock and then decide to brag the whole village that you lockpicked it yourself
@BadMemoryAccess
@BadMemoryAccess 4 ай бұрын
@@Ne-vc5pm But... in your example, you DID lockpick it yourself. I'm guessing you wanted to make an analogy for a script kiddy, but it did not work. It would have been better like this: "someone gives you a tools that you can just put on a lock, and it picks it for you. You use it, and then decide to brag the whole village that you lockpicked it yourself"
@TilmanBaumann
@TilmanBaumann 4 ай бұрын
Should have listened to you
@zAlaska
@zAlaska 4 ай бұрын
I'm dealing with an exploit with my toothbrush. There's no place to put the batteries and it doesn't run, proving I've become a victim of North Korean espionage or something Snowden did.
@sebiai6161
@sebiai6161 4 ай бұрын
Just gonna mention that the Nintendo Switch originally shipped with a vulnerable chip on board which ultimately lead to custom code being executable.
@aleksandertrubin4869
@aleksandertrubin4869 4 ай бұрын
The chip doesn't seem to be a rebaged old chip, from what I found it is Helio P35, which was designed before 2019. Mediatek probably just didn't bother with updating the design. I don't really think there was a malicious intent, and the Rabbit company simply cheaped out. The chip is/recently was very common in low budget devices (below 80$ on many brands). I guess the moral of the story is not to buy devices with pre-2019 chips designed by mediatek
@EwanMarshall
@EwanMarshall 4 ай бұрын
It might be the G35 which is the 2020 rebadge release of the 2018 CPU... but yeah, it is not a 2023 chip by any means.
@nofx714
@nofx714 4 ай бұрын
there goes 10:30 mins of my life i’ll never get back
@mattilindstrom
@mattilindstrom 4 ай бұрын
Many tech companies will obfuscate what key components they use by e.g. laser etching the markings away. Good luck guessing the part number by a standard package format.
@JelloPuddingMaster
@JelloPuddingMaster 4 ай бұрын
3:00 it connects to _chinese_ servers but its encrypted so thats "additional points for privacy"? you have to be joking
@matasstrazdas8467
@matasstrazdas8467 4 ай бұрын
How nice it is for a Lithuanian to see that your employee is from Lithuania
@mephistovonfaust
@mephistovonfaust 4 ай бұрын
The way I understood it it's the other way around. He is employed by CyberNews, that is a Lithuanian company. I could be wrong though. Just what I understood.
@strukmichal2235
@strukmichal2235 4 ай бұрын
For thos wondering what vulnerability it is, its BROM mode
@atxcomputerservices
@atxcomputerservices 4 ай бұрын
why does alot of this look edited and fake?
@amateurprogrammer25
@amateurprogrammer25 4 ай бұрын
Oh no. Root access on a device I own. What a nightmare.
@DoctorBiobrain
@DoctorBiobrain 4 ай бұрын
The key to security on this device is that it’s really expensive and doesn’t do anything. That’s a feature, not a bug.
@nikos4677
@nikos4677 4 ай бұрын
Nice my mum's phone is bricked and the boot loader is locked. I might try to use this exploit to finally fix it
@JigmeDatse
@JigmeDatse 4 ай бұрын
"This was discovered in 2019. Some of you were not even born then." How many 6 year olds do you think watch your videos? Like *really* watch them?
@toututu2993
@toututu2993 2 ай бұрын
Including you yes
@JigmeDatse
@JigmeDatse 2 ай бұрын
@@toututu2993 Mi ne comprenas vin.
@mikeantr
@mikeantr 2 ай бұрын
Most people don't realize that this is such a dangerous layered issue. It starts with hardware, but the entire stack needs to move away from being closed or "hidden". We need open source for everything, to be auditable, secure, and transparent. Automation is going to shock the system in the coming years.
@danielvest9602
@danielvest9602 4 ай бұрын
Do some more like this - deep dives into exploits are my favorite, even the old ones.
@rootshell101
@rootshell101 4 ай бұрын
lol what a glazer
@flickwtchr
@flickwtchr 4 ай бұрын
Just the product design alone was a joke. Also, who would want to keep track of that and their smartphone. The day it came out my first thought was that I would be seeing them in thrift shops within a year.
@leonidas14775
@leonidas14775 4 ай бұрын
If they just made an AI app people could install on any phone, they'd have more success. I think the device was just investor bait.
@null-nl5su
@null-nl5su 4 ай бұрын
Looks like the "debugging port" is a UART. Note the RX and TX pins.
@YarosMallorca
@YarosMallorca 4 ай бұрын
Amazing video!! Please make more videos like this, as a programmer and cybersecurity enthusiast, I really enjoy this style of content, keep it up!!
@cybernews
@cybernews 4 ай бұрын
Thank you!
@koto9x
@koto9x 4 ай бұрын
most advanced ai newscaster i’ve seen from y’all yet ;)
@grande1900
@grande1900 4 ай бұрын
LLL covered pretty much the same vulnerability, but with more information about the actual vulnerability
@kizi86
@kizi86 4 ай бұрын
i think the only reason they went with that specific chip, was it was dirt cheap, because of said vulnerabilities, and the creators of the R1 didnt do their research beforehand, OR if they did, and knew of the vuln, that is treading dangerously close to criminal behaviour, willingly using a bad chip, for a device like that..
@inv_dj
@inv_dj 3 ай бұрын
Not the Monty Python Rabbit catching strays 😭😭🤣🤣🤣🤣
@juandig
@juandig 4 ай бұрын
I could see Rabbit having cheaped out in their source for the CPU and having gotten an inofficial rebadged CPU which used old CPUs.
@jumpstartfpv
@jumpstartfpv 4 ай бұрын
Good job bringing out the risk of buying a second hand Rabbit. But that applies to almost every device running these processors.
@joemck85
@joemck85 3 ай бұрын
The obvious next step is to start connecting random phones, tablets, TVs, routers, smart speakers, robot vacuums, etc. to a laptop and run this exploit. If Mediatek is still selling vulnerable chips and Rabbit bought them, there's no way other random companies haven't also.
@Tiky.8192
@Tiky.8192 4 ай бұрын
Omg!! we can read and write the firmware of a device we own, how craaZzzyyy. That just shows that there should be a foolproof way to do a factory reset on a device, not that we should lock down every piece of equipment...
@Dreadnought-142
@Dreadnought-142 4 ай бұрын
This device would be a practise tool for learning hacking. Or to practise modding devices.
@pp3k07
@pp3k07 4 ай бұрын
I'll even go as far as to say this channel is view farming. Too many views and likes, not enough comments.
@doctoonn
@doctoonn 4 ай бұрын
Summary: Mediatek chip in Rabbit r1 has a vunrability since 2019
@keithgoh123
@keithgoh123 4 ай бұрын
Never let someone else hookup a USB to your device lmao
@Gildermesh
@Gildermesh 4 ай бұрын
You couldn't find a lump of coal in a coal sack, but hey you can say you did if you were handed one.
@madmax404
@madmax404 4 ай бұрын
I was waiting for you to have a point. You didn't. This video is so pointless, of course if you have physical access to a device you can reprogram it and have access to it. That's why the mediatek "vulnerability" isn't considered really notable either. You trying to somehow gas yourself up as if this was some big revelation makes your whole channel look bad
@ObservingBeauty
@ObservingBeauty 4 ай бұрын
Fantastic video. Thanks
@jumpstartfpv
@jumpstartfpv 4 ай бұрын
I'm sure this is a cliffhanger for all the people watching who were born after 2019.
@j7ndominica051
@j7ndominica051 2 ай бұрын
If I own one of these, I'm more than a regular user, and should be allowed to access if fully without hacking it.
@timelordtardis3291
@timelordtardis3291 4 ай бұрын
Can someone tell me what is the stuff that we shouldn't be allowed to do on R1 that the debugging makes possible?
@chanmoua
@chanmoua Күн бұрын
So does this need hardwire or is it able to be hacked wirelessly
@djwikkid
@djwikkid 4 ай бұрын
Wow. This coupled with the fact that all your use is logged to the device, including past GPS history, and the fact that the rabbit hole uses VNC to have you enter your credentials to sites on computers you don't control instead of using oauth tokens client side is a huge liability for consumers. What were they thinking?!
@artemi_sg
@artemi_sg 4 ай бұрын
Hopefully, your researchers are not in Kaliningrad as the map suggests.😂
@joeybruins
@joeybruins 4 ай бұрын
cant wair for the r1 to be used in ddos attakcs
@xpower7125
@xpower7125 4 ай бұрын
was **not** expecting this bro
@TrueBangers
@TrueBangers 4 ай бұрын
YOOO POWER
@EliasFever
@EliasFever 3 ай бұрын
This is a big, and I mean a BIG Security risk. If rabbit does not fix this bug soon. It would probably be discontinued. (Correct me if I am wrong.)
@frodev728
@frodev728 4 ай бұрын
I didn’t realise Christian Bale was a tech head
@sjoer
@sjoer 4 ай бұрын
Never trusted a MediaTek chipset in my life :D
@flcamera
@flcamera 4 ай бұрын
love to see more, thx for sharing
@ZaryanUrRehman
@ZaryanUrRehman 4 ай бұрын
Alternative video title: a rabbit hole of cyber exploits
@jimbosander
@jimbosander 3 ай бұрын
Suggestion for research. Just bought the cheap TP-Link TAPO C220, and found that it requires internet AND inter-client (phone:app and camera) communication. A huge red-flag.
@UltimatePerfection
@UltimatePerfection 4 ай бұрын
6:16 They could use a CPU from a different manufacturer like Qualcomm.
@vidal9747
@vidal9747 4 ай бұрын
I think a serious vulnerability is cause enough to break a contract. It should be law that you can do it if it is serious enough and not up for the contract to decide.
@leonidas14775
@leonidas14775 4 ай бұрын
They should make a tool available to flash the stock firmware. Mediatek already has one called SP flash tool, that they could distribute with instructions and the stock rom.
@brlin
@brlin 4 ай бұрын
Not gonna happen as you don't have the sale quantity to reduce the price of the chip from them.
@greenhacker0com
@greenhacker0com 4 ай бұрын
"We" = your research team..
@barderino5673
@barderino5673 4 ай бұрын
Its insane that we still give views to a company that is legit a scam ........
@adityaray203
@adityaray203 3 ай бұрын
I am curious about how secure are gaming consoles. That could be an interesting device to hack into
@rubenyoungblood3167
@rubenyoungblood3167 2 ай бұрын
Props for the Monty Python reference.
@IlllIlllIlllIlll
@IlllIlllIlllIlll 4 ай бұрын
Good thing I never purchased one
@nathan22211
@nathan22211 4 ай бұрын
so is it possible Rabbit bought the chips from anywhere but Meditak? The chip etching is scratched off pretty much. Also, I can't find anything on the Mediatek R1 that it showed up as. I would highly recommend going to Mediatek themselves and asking about the chip name it came up as. It's very possible that the chip isn't what Rabbit claimed it to be. My guess is that it's a custom chip and Rabbit went with the older architecture that MediaTek used with the vulnerability.
@buhumon123
@buhumon123 4 ай бұрын
7:55 'where money?' wtf come on guys LOL
@Zenless260
@Zenless260 4 ай бұрын
IS ANY1 REALLY USING THAT TRASH? LMAO
@gamereditor59ner22
@gamereditor59ner22 4 ай бұрын
Interesting...🤔
@Jbrimbelibap
@Jbrimbelibap Ай бұрын
I bought one second hand to hackc it myself, no one puts rootkits in R1 devices. People on Leboncoin where I bought it can barely read and write in their native french language for the most part, no one knows that fastboot is, probably don't even know how to install the proper mediatek drivers to even talk to the thing and exploit it. You expect them to build custom software to potentially hack a single person ? On a device that doesn't even have any apps with sensitive data ? Nah the exploit is just what we all needed to get doom to run on this orange box
@tigerscott2966
@tigerscott2966 4 ай бұрын
It's ORANGE! Orange for: FREEMASON! That says it all right there. 2 billion colors and they chose the big O.
@doingtime20
@doingtime20 4 ай бұрын
I don't need to open rabbit to know it's crap, all you need to know is the founder previously had a get rich quick scheme involving a videogame and nfts.
@attribute-4677
@attribute-4677 4 ай бұрын
Did you expect anything less for a Chinese product?
@lol-ru4hs
@lol-ru4hs 4 ай бұрын
we got steve jobs talking rabbit r1
@vibertoo
@vibertoo 4 ай бұрын
what have to say Nothing brand?
@meh11235
@meh11235 3 ай бұрын
Grace period allows the Zero day Market...
@philigan2339
@philigan2339 4 ай бұрын
What is Rabbit R1?
@rettignick
@rettignick 3 ай бұрын
I discovered all this in June. Along with everyone else in the Rabbitude discord.
@RaceCarLogic
@RaceCarLogic 4 ай бұрын
good video, thanks!
@coldham77
@coldham77 2 ай бұрын
I'm kinda shocked Rabbit is still in business. Horrible product.
@zenmoto369
@zenmoto369 4 ай бұрын
It's alright no one even bought that physical android app :D
@Majve
@Majve 4 ай бұрын
Greatings from Serbia 😊
@rubenrubnrbn
@rubenrubnrbn 4 ай бұрын
Happy for more of that!
@cinchstik
@cinchstik 4 ай бұрын
you cracked the fortune cookie and found the following message" "Clarity is better than cleverness"
@Grid21
@Grid21 4 ай бұрын
You know what, 1. I don't care, and 2. So what? Most major "hacks" and "leaks" are not the end users fault, it's the corporate companies fault, and the end user is left holding the bag. Everything is hackable, Just accept that and move on.
@Jbrimbelibap
@Jbrimbelibap Ай бұрын
I mean the mediatek Brom mode vulnerability is just what computers should have by default a fucking flashing interface I want my bootloader unlocked, so that I can do fun admin stuff on my device this includes my 700€ Sony phone, my computer... Devices that respect you like OnePlus, Nothing, Sony just let you unlock the bootloader officially I'm quite happy that it's there, now my R1 runs proper android and it looks hilarious
@j2klegend
@j2klegend 4 ай бұрын
2:48 And the amount of bot activity in comment section indicates that it is what the Rabbit is meant for.. and you should not buy it to serve CCP 😂 Message to the channel: Guys you explained everything in detail but, please be aware of bots when you are touching some countries!
@MrTweetyhack
@MrTweetyhack 4 ай бұрын
does he have any original content
@MCHarperYT
@MCHarperYT 3 ай бұрын
Can you please make a video a install Minecraft to it for the Rabbit r1
@Earth-To-Zan
@Earth-To-Zan 4 ай бұрын
FitMC is that you?
@pepijn_m
@pepijn_m 4 ай бұрын
isn't this a way people use to root their phone. the hack you are talking about? as in is this not just one of the exploits how people add their own rom to a device?
@brlin
@brlin 4 ай бұрын
An exploit that can root your phone can also act as a backdoor to install malware. Products shouldn't have these exploits to be available in the first place.
@5speedfatty
@5speedfatty 3 ай бұрын
ooh nice Leon reference
@4N07H3R_1
@4N07H3R_1 4 ай бұрын
you make good explanations more than AI generated one
@Ym-oi2we
@Ym-oi2we 4 ай бұрын
Working as intended
@ROLEXLOVER123
@ROLEXLOVER123 4 ай бұрын
They could just remove the debug points.
@diynevala
@diynevala 3 ай бұрын
5:09 Gary Oldman in Leon
The Man Who Leaked Windows 95 & Went to Prison
19:10
Cybernews
Рет қаралды 27 М.
I installed Android on Rabbit R1 & Made it Useful
10:03
HowToMen
Рет қаралды 258 М.
IL'HAN - Qalqam | Official Music Video
03:17
Ilhan Ihsanov
Рет қаралды 700 М.
Mom Hack for Cooking Solo with a Little One! 🍳👶
00:15
5-Minute Crafts HOUSE
Рет қаралды 23 МЛН
1% vs 100% #beatbox #tiktok
01:10
BeatboxJCOP
Рет қаралды 67 МЛН
My scorpion was taken away from me 😢
00:55
TyphoonFast 5
Рет қаралды 2,7 МЛН
Inside The World Of Russian Hackers
27:02
Cybernews
Рет қаралды 323 М.
The Hack That Made China a Superpower: Operation Shady Rat
13:49
Cybernews
Рет қаралды 1,5 МЛН
Why VPNs are a WASTE of Your Money (usually…)
14:40
Cyberspatial
Рет қаралды 1,5 МЛН
Gaming on a Rabbit R1
26:21
Bringus Studios
Рет қаралды 1,4 МЛН
Where People Go When They Want to Hack You
34:40
Cybernews
Рет қаралды 2,5 МЛН
NEVER install these programs on your PC... EVER!!!
19:26
JayzTwoCents
Рет қаралды 4,9 МЛН
Behind the Hacks: The Origins of Anonymous | Cyberwar
22:31
VICE News
Рет қаралды 2,4 МЛН
Rabbit R1 - We Gotta Talk...
10:55
Dave2D
Рет қаралды 627 М.
7 Cybersecurity Tips NOBODY Tells You (but are EASY to do)
13:49
All Things Secured
Рет қаралды 1,2 МЛН
IL'HAN - Qalqam | Official Music Video
03:17
Ilhan Ihsanov
Рет қаралды 700 М.