Search found 30 matches
- Wed Aug 21, 2019 12:20 am
- Forum: General Discussion
- Topic: Prevent Modification of NVS Data
- Replies: 6
- Views: 5851
Re: Prevent Modification of NVS Data
Okay, thank you for the explanation. I guess apps should just be robust enough to anticipate tampering/erasing of NVS data. I will consider this for the future.
- Tue Aug 20, 2019 10:07 pm
- Forum: General Discussion
- Topic: Prevent Modification of NVS Data
- Replies: 6
- Views: 5851
Re: Prevent Modification of NVS Data
Is it possible to just disable the UART interface to the chip so that physical tampering is impossible?
- Tue Aug 20, 2019 9:08 pm
- Forum: General Discussion
- Topic: Prevent Modification of NVS Data
- Replies: 6
- Views: 5851
- Tue Aug 20, 2019 2:23 pm
- Forum: General Discussion
- Topic: Prevent Modification of NVS Data
- Replies: 6
- Views: 5851
Prevent Modification of NVS Data
Hello,
Is there a way to prevent unauthorized modification of data in the NVS partition (for example, via esptool write_flash)?
Thanks.
Is there a way to prevent unauthorized modification of data in the NVS partition (for example, via esptool write_flash)?
Thanks.
- Wed Aug 07, 2019 5:02 pm
- Forum: ESP-IDF
- Topic: Getting Target "flash_project_args_target" not found error while enabling secure Boot + Flash encryption
- Replies: 9
- Views: 7812
Re: Getting Target "flash_project_args_target" not found error while enabling secure Boot + Flash encryption
I am also having this issue.
- Sat Jun 08, 2019 2:12 pm
- Forum: General Discussion
- Topic: ESP32 Classification
- Replies: 1
- Views: 2448
ESP32 Classification
Hello, I am trying to figure out how to classify popular IoT devices, including the ESP32. One of these classifications is MCU vs. MPU vs SoC, etc. It seems each of these terms refers to a completely different kind of device, e.g., MCUs are low-power ICs with a CPU, some memory, and some peripheral ...
- Mon Apr 15, 2019 3:50 pm
- Forum: Hardware
- Topic: ESP32 Test Flash Encryption
- Replies: 1
- Views: 2793
ESP32 Test Flash Encryption
Hello, I want to implement a modified flash encryption feature onto my ESP32 that uses a user-supplied 256-bit key to encrypt and decrypt flash contents, rather than eFuse Block 1. The reason for this is that I want to be able to test flash encryption functionality without making any permanent chang...
- Mon Jan 28, 2019 4:50 pm
- Forum: Hardware
- Topic: ESP32 with ATECC608A
- Replies: 9
- Views: 22717
ESP32 with ATECC608A
Hello, I am trying to configure the ESP32 with ATECC608. My goal is to connect to AWS over a TLS connection. However, I would like to utilize the HW acceleration/security features of the ECC608 during the TLS handshake (specifically, the ECDSA signature verification). It would be preferable to use e...
- Tue Oct 16, 2018 2:20 pm
- Forum: General Discussion
- Topic: Security Advantage of Limiting Serial Updates for Flash Encryption
- Replies: 2
- Views: 3217
Re: Security Advantage of Limiting Serial Updates for Flash Encryption
This makes complete sense. Thank you!
- Tue Oct 16, 2018 1:12 am
- Forum: General Discussion
- Topic: Security Advantage of Limiting Serial Updates for Flash Encryption
- Replies: 2
- Views: 3217
Security Advantage of Limiting Serial Updates for Flash Encryption
Hi all, This may seem like a trivial matter to most of you. For some reason, I'm just having trouble wrapping my head around it. My question is this: what is the inherent security advantage to placing a limit on (plaintext) serial updates once flash encryption is enabled? It seems to me that with fl...