A tweet from #AndroidPolice on Android booloaders and the security mechanism around it came to me through #cyanogen today. While it’s not meant to be comprehensive, I think it does help point developers and modders in the right direction to understanding come fundamental building blocks in information security. The fact that these security circumvention techniques float about on the Net goes to show that although the underlying encryption schemes and ciphers remain intact, hackers have consistently managed to find attack vectors that “side step” these measures, hence the term “circumvention”. It’s a proverbial game of cat and mouse perhaps calculated to cost-effectively block a majority of users while appeasing to script kiddies and modders alike. Link to the post on Android Police here.