Linked by Thom Holwerda on Sun 6th Jan 2013 23:00 UTC
Windows "It's taken longer than expected but it has finally happened: unsigned desktop applications run on Windows RT. Ironically, a vulnerability in the Windows kernel that has existed for some time and got ported to ARM just like the rest of Windows made this possible. MSFT's artificial incompatibility does not work because Windows RT is not in any way reduced in functionality. It's a clean port, and a good one. But deep in the kernel, in a hashed and signed data section protected by UEFI's Secure Boot, lies a byte that represents the minimum signing level." Good stuff. Very good stuff.
Thread beginning with comment 547649
To view parent comment, click here.
To read all comments associated with this story, please click here.
RE[3]: Comment by MOS6510
by Thom_Holwerda on Mon 7th Jan 2013 11:05 UTC in reply to "RE[2]: Comment by MOS6510"
Member since:

Illegal software?

Only open source software can be ported to Windows RT with this (since proprietary vendors won't, of course). How is that illegal?

Reply Parent Score: 4

RE[4]: Comment by MOS6510
by MOS6510 on Mon 7th Jan 2013 11:25 in reply to "RE[3]: Comment by MOS6510"
MOS6510 Member since:

Ah, I was under the impression that anything could be installed, so also cracked warez.

Reply Parent Score: 2

RE[5]: Comment by MOS6510
by MrWeeble on Mon 7th Jan 2013 12:47 in reply to "RE[4]: Comment by MOS6510"
MrWeeble Member since:

No, the hacked warez would be x86 code. To work on the tablet, it would need to be recompiled for ARM, which requires the source-code to feed into the compiler. I suppose there may be some closed source stuff that people have stolen the sourcecode for, but I doubt that would be much of a large-scale issue.

Reply Parent Score: 3