▲ | bri3d 6 days ago | |
Oh, I understand now - you're right, OTP sensor data does protect against a real threat model I hadn't considered before: * A remote attacker gains whatever privilege lets them get to the sensor SPI. * Without OTP calibration, the attacker could reprogram the sensor silently to report a different endstop, keeping the machine awake and the hard-cuts active. * With OTP calibration, this is closed. So perhaps it is more security-related than I initially thought. I was more considering the counterfeit part / supply chain / evil maid scenario, where the fact that Apple's sensors are OTP is meaningless (since a replacement sensor doesn't need to be, plus, you could just put a microcontroller pretending to be a sensor in there since there's no actual protection). Thanks, you made me think again and figure it out! |