Hacking of consumer electronics

The hacking of consumer electronics is a common practice that users perform to customize and modify their devices beyond what is typically possible.

When this is stored in a mutable storage device, these files can be modified to add functionality to the operating system, or to replace it entirely.

Typically, a root shell is aimed for, which grants administrative privileges, to let the user modify operating system files.

Root access can be obtained through the use of software exploits (i.e. bugs), through the bootloader console, or over a serial port embedded in the device, such as a JTAG or UART interface.

An instance of this was when Naomi Wu requested the GPLv2 licensed source code of the Linux Kernel branch of a smartphone vendor.

Device manufacturers often include countermeasures to hinder hardware hacking, one of which is the use of cryptography to prevent unauthorized code from being executed.

Whistleblower Edward Snowden showed Wired correspondent Shane Smith how to remove the cameras and microphones from a smartphone.

[18][19] In around 2010, the High-bandwidth Digital Content Protection encryption system, which encrypts data running between cable boxes, Blu-ray players, and other similar devices and displays was cracked, and a copy of the master key needed to decrypt HDCP protected streams was posted on the internet.

Hardware hacking has allowed this Nokia N9 smartphone to run with Xfce , a desktop interface on an postmarketOS , an alternative operating system.
A smartphone showing a bootloader screen
Phones like the Galaxy Nexus , part of the Google Nexus series, are designed to allow root access and easy modification of the system [ 15 ]