Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

What about the blobs mentioned before? Those are closed source binaries running as root with direct access to the hardware, like the baseband modem. It can talk to the internet without any auditing being possible.



Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: