<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Best place to lock debugging interface (SWD) using APPROTECT</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/39369/best-place-to-lock-debugging-interface-swd-using-approtect</link><description>Hello All 
 I&amp;#39;m trying to lock debugging/reading capability in my code. My system consists of a bootloader and an application beside the Softdevice and MBR. 
 What is already done is to check and change APPROTECT as the first thing in the main function</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Thu, 11 Oct 2018 10:05:21 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/39369/best-place-to-lock-debugging-interface-swd-using-approtect" /><item><title>RE: Best place to lock debugging interface (SWD) using APPROTECT</title><link>https://devzone.nordicsemi.com/thread/152458?ContentTypeID=1</link><pubDate>Thu, 11 Oct 2018 10:05:21 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:994b004e-f685-453a-a575-d71cca8795a3</guid><dc:creator>Yahya Tawil</dc:creator><description>&lt;p&gt;Tahnks for the answer. Got it.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Yes, we are working on an encrypted DFU process.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Best place to lock debugging interface (SWD) using APPROTECT</title><link>https://devzone.nordicsemi.com/thread/152456?ContentTypeID=1</link><pubDate>Thu, 11 Oct 2018 09:55:53 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:56f5ebdf-e7d5-42ee-9b3d-e413f8ee6a3e</guid><dc:creator>Turbo J</dc:creator><description>&lt;p&gt;Simply don&amp;#39;t use mass erase in the firmware update process. There is no need to touch UICR during an upgrade.&lt;/p&gt;
&lt;p&gt;Note that unless your firmware upgrade file is properly encryped (not easy), the attacker has everything in his hands already.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>