Date: Fri, 15 Jun 2007 16:36:59 +0200 From: "=?UTF-8?Q?Karl_Sj=C3=B6dahl_-_dunceor?=" <dunceor@gmail.com> To: freebsd-embedded@freebsd.org Subject: Re: Embedded systems protection? Message-ID: <5d84cb30706150736v7f156277x5588b307bd72a014@mail.gmail.com> In-Reply-To: <20070615122545.GA53280@tirith.brixandersen.dk> References: <467272F7.4010301@bulinfo.net> <5d84cb30706150434u6e722912w9edac38e62bd97c3@mail.gmail.com> <20070615122545.GA53280@tirith.brixandersen.dk>
index | next in thread | previous in thread | raw e-mail
On 6/15/07, Henrik Brix Andersen <henrik@brixandersen.dk> wrote: > On Fri, Jun 15, 2007 at 01:34:49PM +0200, Karl Sjödahl - dunceor wrote: > > One way that is popular is to use a OTP flash with a cert inside that > > you verify to see if something has changed. > > How will that protect from copying? The contents of the flash can > still be read. > > One solution, which I have used earlier, is to have a small bootloader > in internal flash which then loads, verifies and decrypts the main > application (which has been encrypted) from external flash. The key > point here is to make sure the internal flash can not be read out by > any means. > > Regards, > Brix > -- > Henrik Brix Andersen <henrik@brixandersen.dk> > > Ah you are all so right, I thought about protection from tampering and flashing their own software, not secure against copying. Sorry. br dunceorhelp
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5d84cb30706150736v7f156277x5588b307bd72a014>
