▲ | j4hdufd8 2 days ago | ||||||||||||||||
Where are you getting this information? For what it is worth, Wikipedia mentions the Pixel 6 on the eFuse page https://en.wikipedia.org/wiki/EFuse Myself I have not reverse engineered the Titan M2 security chip, but surely it uses eFuse or OTP memory for anti rollback protection mechanisms and such. These are really basic hardware security primitives. I'm curious why you're under the impression Pixels wouldn't use eFuse. | |||||||||||||||||
▲ | Andromxda 2 days ago | parent | next [-] | ||||||||||||||||
> For what it is worth, Wikipedia mentions the Pixel 6 on the eFuse page https://en.wikipedia.org/wiki/EFuse The Pixel 6 is only mentioned in regards to anti-rollback protection. This has nothing to do with unlocking and later relocking the bootloader. Pixels have always supported relocking the bootloader with a custom root of trust, i.e. custom AVB signing keys used by a custom, user-installed operating system. https://source.android.com/docs/security/features/verifiedbo... | |||||||||||||||||
| |||||||||||||||||
▲ | scrlk a day ago | parent | prev [-] | ||||||||||||||||
You mentioned devices being irreversibly "tainted" after unlocking the bootloader. On Samsung devices, blowing the Knox eFuse permanently disables features tied to Knox (e.g. Samsung Pay, Secure Folder). ("can never go back to a state where it passes all checks") Pixels do not have an equivalent eFuse that permanently disables features (discounting the ability to flash previous versions of Android). Restoring stock firmware and relocking the bootloader will give you a normal Pixel. | |||||||||||||||||
|