answered
2014-09-06 14:29:20 +0200
You can find out quite a bit with googling and looking at the system. I've wanted to write this up for some time, but since there's no Wiki, it will probably get lost in the Q&A style, but here we go anyhow.
The Jolla Sailphone uses an QCT MSM8930 CDP SoC. This is a Snapdragon 400 architecture, consisting of the ARM CPU cores together with several Hexagon DSPs (see also here). This DSP is an VLIW with a proprietary instruction set. It's not entirely clear how they are used, but there are probably two in the Modem subsystem and one for Multimedia, possible more (less general ones). The Multimedia DSP can in theory be programmed by applications for things like face recognition and speech analysis (or other typical DSP workloads). The modem DSPs or similar cores are probably responsible for all radio-related activities (and potentially much of that as Software Defined Radio): GSM, LTE etc.; WLAN, Bluetooth; noise-cancelling, FM-radio and GPS/Glonass.
The firmware images for these coprocessors can be found in /firmware/image
on the Sailphone. It's very likely that these are protected with a cryptographic checksum on boot, so one probably cannot change them directly.
The main cores, coprocessors and other components on the SoC are connected by various busses (called "fabrics"). At least one of them is a Slimbus. One can only speculate if the coprocessors have direct access to the main memory, or if they need to go through the main core(s) in order to access it.
As to the security implications: The baseband DSP is complex, the protocol is complex, so it's likely to contain bugs or even backdoors. So you shouldn't visit China if there's sensitive information on your Sailphone, but then any cellphone or laptop is likely to get (physically) compromised when visiting China, so that's not news. Even if the NSA or similar agencies have reverse engineered the baseband, found bugs, tailored the bugs to specifically access Jolla (which is different from most Android phones/iPhones), and consider you important enough to target you in that way, they still would have a lot easier time by just get physical access to your phone or just listening in on the communications.
So in terms of being a real threat it's rather unlikely. The Jolla developers can't do anything about that, either, because they are probably bound by a contract to not reverse engineer or change the firmware, and they likely don't have the time for it, anyway.
It would be much more interesting to gain access to the Multimedia DSP and be able to play around with it. I'd also be interested in a more low-level access to the GPS interface.
It is highly likely that the GSM modem can get access to the RAM used by the CPU. Something to be considered for Jolla 2.
richardski ( 2014-04-09 13:02:17 +0200 )editFunny how nobody seems to want to answer this kind of question :D
velimir ( 2014-09-02 12:09:05 +0200 )editMaybe those at Jolla who could answer are not allowed because of NDA or something?
Venty ( 2014-09-02 12:12:31 +0200 )edityes, but with whom did they sign the nda and why? all interesting questions, considering they advertise the device as "Open source"..
Disclaimer; i am not trying to give blame here, i just find these questions interesting :)
velimir ( 2014-09-02 12:16:43 +0200 )edit