Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 15 Jun 2007 16:36:59 +0200
From:      "=?UTF-8?Q?Karl_Sj=C3=B6dahl_-_dunceor?=" <dunceor@gmail.com>
To:        freebsd-embedded@freebsd.org
Subject:   Re: Embedded systems protection?
Message-ID:  <5d84cb30706150736v7f156277x5588b307bd72a014@mail.gmail.com>
In-Reply-To: <20070615122545.GA53280@tirith.brixandersen.dk>
References:  <467272F7.4010301@bulinfo.net> <5d84cb30706150434u6e722912w9edac38e62bd97c3@mail.gmail.com> <20070615122545.GA53280@tirith.brixandersen.dk>

index | next in thread | previous in thread | raw e-mail

On 6/15/07, Henrik Brix Andersen <henrik@brixandersen.dk> wrote:
> On Fri, Jun 15, 2007 at 01:34:49PM +0200, Karl Sjödahl - dunceor wrote:
> >  One way that is popular is to use a OTP flash with a cert inside that
> >  you verify to see if something has changed.
>
> How will that protect from copying? The contents of the flash can
> still be read.
>
> One solution, which I have used earlier, is to have a small bootloader
> in internal flash which then loads, verifies and decrypts the main
> application (which has been encrypted) from external flash. The key
> point here is to make sure the internal flash can not be read out by
> any means.
>
> Regards,
> Brix
> --
> Henrik Brix Andersen <henrik@brixandersen.dk>
>
>

Ah you are all so right, I thought about protection from tampering and
flashing their own software, not secure against copying. Sorry.

br
dunceor

help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5d84cb30706150736v7f156277x5588b307bd72a014>