| ▲ | himata4113 2 hours ago | |||||||
Does anyone know why the binary blobs cannot be reverse engineered in the age of AI and recompiled to closely match the original source? Is it for legal reasons? Is it firmware signatures? | ||||||||
| ▲ | bradfa 2 hours ago | parent | next [-] | |||||||
Many silicon vendors, when providing said binary blobs to a device OEM or even just documentation or source code for the binary blobs, will make companies agree to a license or other legal terms which prohibits reverse engineering. Often the direct recipient of the binary blobs (the OEM of the device) cannot legally let their employees nor contractors perform the reverse engineering. Generally, unless a similar license or legal terms are required to be agreed to by the end user, nothing stops the end user from reversing said binary blobs. But before you attempt this, be sure you fully understand every legal document which was presented to you by the device vendor. Click-through EULAs included. | ||||||||
| ▲ | sschueller 2 hours ago | parent | prev | next [-] | |||||||
They probably can many things but I think things like memory timing is something you can't just easily reverse engineer from a blob. You need to test every state that the device can be in and see how the blob responds which is quite difficult. | ||||||||
| ||||||||
| ▲ | x-complexity 2 hours ago | parent | prev [-] | |||||||
The capability isn't there yet. Some of it is there, but not to the level of reliable reverse engineering. | ||||||||
| ||||||||