0 Members and 1 Guest are viewing this topic.
So if the magic security chip is a peripheral, and the MCU controls the USB and OLED, why couldn't malicious firmware just ignore the security chip altogether, and implement fake security functionality internally?Am I missing something ?
4) The root of trust for the current batch is the following secp256k1 public key : 0490f5c9d15a0134bb019d2afd0bf297149738459706e7ac5be4abc350a1f818057224fce12ec9a65de18ec34d6e8c24db927835ea1692b14c32e9836a75dad609 - as checked here Genuine.py