Secure boot ensures only authentic firmware can run on a device and should form part of a layered defence strategy.
But is it enough to only have a secure boot on your main processor?
What about sub-systems without secure boot capabilities? 🤔
https://www.pentestpartners.com/security-blog/is-secure-boot-on-the-main-application-processor-enough/
But is it enough to only have a secure boot on your main processor?
What about sub-systems without secure boot capabilities? 🤔
https://www.pentestpartners.com/security-blog/is-secure-boot-on-the-main-application-processor-enough/
Comments