<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>nRF AntiCloning methods</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/103939/nrf-anticloning-methods</link><description>Hello, 
 I&amp;#39;m wondering how you tackle the issues for manufacturing companies to prevent overproduction or firmware modification to remove anticloning features of the firmware. For the nRF91 and others, you have an immutable bootloader, which imposes a</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Wed, 20 Sep 2023 12:30:09 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/103939/nrf-anticloning-methods" /><item><title>RE: nRF AntiCloning methods</title><link>https://devzone.nordicsemi.com/thread/446875?ContentTypeID=1</link><pubDate>Wed, 20 Sep 2023 12:30:09 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:908ec998-3946-472f-ab83-cfea85c73238</guid><dc:creator>Einar Thorsrud</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
[quote user=""]Do the nRF91 and nRF52 series have some kind of firmware verification feature such as only signed immutable bootloaders are booted? So the integrity of the immutable bootloader is verified?[/quote]
&lt;p&gt;In the nRF52, nRF53 and nRF91 root of thrust is established by the immutable bootloader (in nRF53 and nRF91 there is also the use of the KMU but that is details in this regard). See &lt;a href="https://devzone.nordicsemi.com/nordic/nordic-blog/b/blog/posts/an-introduction-to-trusted-firmware-m-t-m"&gt;An Introduction to Trusted Firmware-M (TF-M)&lt;/a&gt;&amp;nbsp;for an introduction to this. These devices to not have a hardware root of trust. This&amp;nbsp;will improve&amp;nbsp;in&amp;nbsp;coming products, but I cannot discuss non-public devices. I suggest you contact your Nordic regional sales manager about new features in new products.&lt;/p&gt;
[quote user=""]Do you provide services to pre-flash your chips and lock them so the manufacturer does not have access to the immutable firmware?[/quote]
&lt;p&gt;We do not normally provide programming services, but I suggest you ask sales about that. Ignoring that, it is possible to protect the content of the flash from being read back using the Access port protection mechanism. So if the devices are programmed beforehand and that is enabled, the connect cannot be read back at a later stage (including on the manufacturing line). Note that it will also not be possible to write anything via SWD after this point. See &lt;a href="https://infocenter.nordicsemi.com/topic/ps_nrf5340/ctrl-ap.html?cp=4_0_0_7_9"&gt;CTRL-AP&lt;/a&gt;&amp;nbsp;for details.&lt;/p&gt;
[quote user=""]Do you have any suggestions on how to go around this problem?[/quote]
&lt;p&gt;If the devices are used together with something cloud connected, you can typically&amp;nbsp;use that to validate the identity of a device. And if&amp;nbsp;someone have been able to clone the device identity it may be possible to detect that on the cloud side during onboarding for instance. There are also approaches that can be used like generating identity keys on the device and never making those accessible from the outside world (this is possible with the nF5340 and nRF91 where symmetrical keys kan be stored in the KMU with&amp;nbsp;permissions&amp;nbsp;preventing them from being read out). I suggest having a look at the &lt;a href="https://devzone.nordicsemi.com/nordic/nordic-blog/b/blog/posts/securing-iot-products-with-psa-certified-apis"&gt;Securing IoT products with PSA Certified APIs&lt;/a&gt;&amp;nbsp;blog post, as well as the &lt;a href="https://developer.nordicsemi.com/nRF_Connect_SDK/doc/2.4.2/nrf/samples/tfm/tfm_psa_template/README.html"&gt;TF-M: PSA template&lt;/a&gt; and accompanying &lt;a href="https://developer.nordicsemi.com/nRF_Connect_SDK/doc/2.4.2/nrf/samples/tfm/provisioning_image/README.html"&gt;TF-M: Provisioning image&lt;/a&gt;.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>