From ebe6ea5149fc7bbc5844d11bca03b22869d270d8 Mon Sep 17 00:00:00 2001 From: Giulio Date: Sun, 1 Nov 2020 20:41:21 +0100 Subject: [PATCH] typo --- Readme.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Readme.md b/Readme.md index 68014df..501cfea 100644 --- a/Readme.md +++ b/Readme.md @@ -374,7 +374,7 @@ The graphic interface library is `libxui.so`. By finding a vulnerability in a Merchant App, in `libosal.so` or in one in the kernel drivers a remote attack via a payment vector is theoretically possible. Unfortunately, due to the lack of second hand production PoS in the used market, I'm unable to get a test device with a working Merchant App unless I open a contract with a bank (which I don't want to). If anyone has contacts or is willing to provide one, or need assistance for futher research drop me an email or a tweet. ## Reporting -I tried contacting several times PAX Global via email and never got a reply related to anything: neither about the security vulneabilities, neither on inquiries about the source code fot the GPL licensed software (Linux/U-Boot). +I tried contacting several times PAX Global via email and never got a reply related to anything: neither about the security vulneabilities, neither on inquiries about the source code for the GPL licensed software (Linux/U-Boot). ## Fun fact I had issues understanding the `shadow` password format: