Bitfrost: the OLPC security model
Posted Feb 9, 2007 10:29 UTC (Fri) by tzafrir
In reply to: Bitfrost: the OLPC security model
Parent article: Bitfrost: the OLPC security model
Are those developer keys different from system to system?
If not: all you need is one leaked key.
Once you get a hold of such a device, you ditch the original (limited) software, and replace it with an unlimited software.
How come this is not possible, and not simple to do automatically?
to post comments)