| ▲ | QuiEgo 5 hours ago | |||||||||||||||||||||||||||||||
OTP memory is a key building block of any secure system and likely on any device you already have. Any kind of device-unique key is likely rooted in OTP (via a seed or PUF activation). The root of all certificate chains is likely hashed in fuses to prevent swapping out cert chains with a flash programmer. It's commonly used to anti rollback as well - the biggest news here is that they didn't have this already. If there's some horrible security bug found in an old version of their software, they have no way to stop an attacker from loading up the broken firmware to exploit your device? That is not aligned with modern best practices for security. | ||||||||||||||||||||||||||||||||
| ▲ | mrsssnake 4 hours ago | parent [-] | |||||||||||||||||||||||||||||||
> they have no way to stop an attacker from loading up the broken firmware to exploit your device You mean the attacker having a physical access to the device plugging in some USB or UART, or the hacker that downgraded the firmware so it can use the exploit in older version to downgrade the firmware to version with the exploit? | ||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||