Secure boot ensures only authentic firmware can run on a device and should form part of a layered defence strategy.

But is it enough to only have a secure boot on your main processor?

What about sub-systems without secure boot capabilities? 🤔

https://www.pentestpartners.com/security-blog/is-secure-boot-on-the-main-application-processor-enough/
Post image

Comments