Windows RT jailbroken to run third-party Desktop apps

Posted by Fettoosh on Jan 8, 2013 12:52 PM EDT
ExtremeTech; By Sebastian Anthony
Mail this story
Print this story

The hack, performed by Clokr, exploits a vulnerability in the Windows kernel that has existed for a long time — since before Microsoft ported Windows from x86 to ARM, in fact. Basically, the Windows kernel on your computer is configured to only execute files that meet a certain level of authentication. There are four levels: Unsigned (0), Authenticode (4), Microsoft (8), and Windows (12). On your x86 Windows system, the default setting is Unsigned — you can run anything you like. With Windows RT, the default, hard-coded setting is Microsoft (8); i.e. only apps signed by Microsoft, or parts of Windows itself, can be executed.

Full Story

  Nav
» Read more about: Story Type: News Story; Groups: ARM, Microsoft, Tablets

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.