Given a device, how do you know whether the SoC is actually fused to implement secure boot or not? You almost certainly produced dev parts that didn't implement it, and how do you verify that none of them ended up in the wrong hands?
Power management, mobile and firmware developer on Linux. Security developer at nvidia. Ex-biologist. Content here should not be interpreted as the opinion of my employer. Also on Mastodon and Bluesky.
Re: non-x86 trusted boot requirements
Date: 2023-07-17 05:03 pm (UTC)