This post is older than 2 years and might not be relevant anymore
More Info: Consider searching for newer posts

Software Security of NRF52832

HI,

I want to implement the software security to NRF52832 such a that no one should be able to read the memory or tap the data during Bluetooth communication.

Regards,

Manoj Hiwarkar

Parents
  • Hi

    We don't have any examples implementing APPROTECT, as that would cause the device to have to recover every time it is flashed, but there are two rather simple ways of implementing it. Either, you can set it in your application code like my colleague explains in this thread. Or, you can download nrfjprog on your computer and enable APPROTECT by calling the command nrfjprog --rbp all in a command window when your device is connected. In both cases, you will have to recover the chip/ do a full chip erase in order to access the memory of the chip. 

    Yes, anyone with a debugger will be able to erase the flash of your device, unless you remove that option by not connecting the debug pins. I assume you won't be reprogramming the device when it's released.

    Best regards,

    Simon

Reply
  • Hi

    We don't have any examples implementing APPROTECT, as that would cause the device to have to recover every time it is flashed, but there are two rather simple ways of implementing it. Either, you can set it in your application code like my colleague explains in this thread. Or, you can download nrfjprog on your computer and enable APPROTECT by calling the command nrfjprog --rbp all in a command window when your device is connected. In both cases, you will have to recover the chip/ do a full chip erase in order to access the memory of the chip. 

    Yes, anyone with a debugger will be able to erase the flash of your device, unless you remove that option by not connecting the debug pins. I assume you won't be reprogramming the device when it's released.

    Best regards,

    Simon

Children
Related