<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Software Security of NRF52832</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/55662/software-security-of-nrf52832</link><description>HI, 
 I want to implement the software security to NRF52832 such a that no one should be able to read the memory or tap the data during Bluetooth communication. 
 Regards, 
 Manoj Hiwarkar</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Thu, 19 Dec 2019 13:26:38 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/55662/software-security-of-nrf52832" /><item><title>RE: Software Security of NRF52832</title><link>https://devzone.nordicsemi.com/thread/226385?ContentTypeID=1</link><pubDate>Thu, 19 Dec 2019 13:26:38 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:7bb58963-aecc-4c83-bb71-abe7449f05e0</guid><dc:creator>manoj12345</dc:creator><description>&lt;p&gt;ok&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Software Security of NRF52832</title><link>https://devzone.nordicsemi.com/thread/226383?ContentTypeID=1</link><pubDate>Thu, 19 Dec 2019 13:22:23 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:6b9758b9-9c7c-475d-bd5a-30e4c1f3a0cc</guid><dc:creator>Simonr</dc:creator><description>&lt;p&gt;Hi&lt;/p&gt;
&lt;p&gt;We are starting to move off-topic from software security now. Please create a new support ticket for these issues, as we strive to keep each ticket to one subject to make it easier for people with similar problems in the future to find what they&amp;#39;re looking for.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Simon&lt;/p&gt;
&lt;p&gt;PS: The Holiday season is upon us, which will leave us understaffed until January 6th, 2020, so delayed replies will occur during this time. Sorry for the inconvenience and happy Holidays!&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Software Security of NRF52832</title><link>https://devzone.nordicsemi.com/thread/226364?ContentTypeID=1</link><pubDate>Thu, 19 Dec 2019 12:26:07 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:ed09b7ac-110f-4634-a92f-38ccad60196a</guid><dc:creator>manoj12345</dc:creator><description>&lt;p&gt;okay thank you so much.&amp;nbsp;Two&amp;nbsp;more things simon,&lt;/p&gt;
&lt;p&gt;1. Will&amp;nbsp;nrf52 will only get connected to apps provided by nordic? I want to it to get connected to serial blueooth terminal which is not happening.&lt;/p&gt;
&lt;p&gt;2. How to implement serialization.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Software Security of NRF52832</title><link>https://devzone.nordicsemi.com/thread/226287?ContentTypeID=1</link><pubDate>Thu, 19 Dec 2019 08:22:17 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:3a09af26-4ab9-49f0-8fbd-2b9f5a997217</guid><dc:creator>Simonr</dc:creator><description>&lt;p&gt;Hi&lt;/p&gt;
&lt;p&gt;We don&amp;#39;t have any examples implementing APPROTECT, as that would cause the device to have to recover every time it is flashed, but there are two rather simple ways of implementing it. Either, you can set it in your application code like my colleague explains in &lt;a href="https://devzone.nordicsemi.com/f/nordic-q-a/30517/enabling-access-port-protection-from-code"&gt;this thread&lt;/a&gt;. Or, you can download &lt;a href="https://www.nordicsemi.com/Software-and-Tools/Development-Tools/nRF-Command-Line-Tools/Download"&gt;nrfjprog &lt;/a&gt;on your computer and enable APPROTECT by calling the command &lt;strong&gt;nrfjprog --rbp all&amp;nbsp;&lt;/strong&gt;in a command window when your device is connected. In both cases, you will have to recover the chip/ do a full chip erase in order to access the memory of the chip.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Yes, anyone with a debugger will be able to erase the flash of your device, unless you remove that option by not connecting the debug pins. I assume you won&amp;#39;t be reprogramming the device when it&amp;#39;s released.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Simon&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Software Security of NRF52832</title><link>https://devzone.nordicsemi.com/thread/226124?ContentTypeID=1</link><pubDate>Wed, 18 Dec 2019 11:52:13 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:aacb2f3f-242e-4400-8d9e-1de558679672</guid><dc:creator>manoj12345</dc:creator><description>&lt;p&gt;The whole flash can be deleted by any one who have programmer/debugger right ?. I only should have access for that. Also is there any reference code available in which this is APPROTECT is implemented ?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Software Security of NRF52832</title><link>https://devzone.nordicsemi.com/thread/226121?ContentTypeID=1</link><pubDate>Wed, 18 Dec 2019 11:39:25 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:524df7ad-264d-4b67-a7e9-6bb914479410</guid><dc:creator>Simonr</dc:creator><description>&lt;p&gt;Hi&lt;/p&gt;
&lt;p&gt;By using APPROTECT, no one will be able to read the memory on your chip, as the only way to disable it will be to delete the whole flash, which will delete your application as well, which is what makes this a safe way to protect the memory on your device.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Simon&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Software Security of NRF52832</title><link>https://devzone.nordicsemi.com/thread/226046?ContentTypeID=1</link><pubDate>Wed, 18 Dec 2019 08:57:29 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:afba6b5b-64ce-4c89-8a15-4f4a5286d930</guid><dc:creator>manoj12345</dc:creator><description>&lt;p&gt;OK. But I don&amp;#39;t want anyone else to disable the protection except me.&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Software Security of NRF52832</title><link>https://devzone.nordicsemi.com/thread/226023?ContentTypeID=1</link><pubDate>Wed, 18 Dec 2019 07:51:36 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:327d0bfc-818b-46bf-8609-3608a0d6af63</guid><dc:creator>Simonr</dc:creator><description>&lt;p&gt;Hi&lt;/p&gt;
&lt;p&gt;&lt;a href="https://infocenter.nordicsemi.com/index.jsp?topic=%2Fps_nrf52840%2Fdif.html&amp;amp;cp=4_0_0_3_7_1&amp;amp;anchor=concept_udr_mns_1s"&gt;APPROTECT (Access port protection)&lt;/a&gt; blocks the debugger from read and write access to all CPU registers and memory-mapped addresses and can only be disabled by issuing an ERASEALL command via the CTRL-AP.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://infocenter.nordicsemi.com/index.jsp?topic=%2Fps_nrf52810%2Fbprot.html&amp;amp;resultof=%22%42%50%52%4f%54%22%20%22%62%70%72%6f%74%22%20"&gt;BPROT (Block Protection)&lt;/a&gt;&amp;nbsp;is a mechanism for protecting non-volatile memory and can be used to prevent erroneous application code from erasing/writing to protected blocks. Non-volatile memory can be protected from erases and writes depending on the settings in the CONFIG registers. One bit in a CONFIG register represents one protected block of 4kB.&amp;nbsp; On reset, all protection bits are cleared. To ensure safe operation, the first task after a reset must be to set the protection bits.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Simon&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Software Security of NRF52832</title><link>https://devzone.nordicsemi.com/thread/225855?ContentTypeID=1</link><pubDate>Tue, 17 Dec 2019 11:26:37 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:349570f4-e0a9-4ede-aa0a-3f1517fdd8ad</guid><dc:creator>manoj12345</dc:creator><description>&lt;p&gt;Simon I am not able understand the difference APPROTECT and BPROT. Can you please clarify ? and if we enable the protection then how to disable it again whenever we want ?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Software Security of NRF52832</title><link>https://devzone.nordicsemi.com/thread/225792?ContentTypeID=1</link><pubDate>Tue, 17 Dec 2019 05:58:15 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:c03092dd-1a2f-4a9d-afb3-7173149f4439</guid><dc:creator>manoj12345</dc:creator><description>&lt;p&gt;Ok simon thank you so much. I will get back to you for further queries&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Software Security of NRF52832</title><link>https://devzone.nordicsemi.com/thread/225698?ContentTypeID=1</link><pubDate>Mon, 16 Dec 2019 14:39:01 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:fcc2cc92-799c-4eaf-a34b-c4e89897e4fa</guid><dc:creator>Simonr</dc:creator><description>&lt;p&gt;Hi&lt;/p&gt;
&lt;p&gt;Quote from the blog: &amp;quot;LE Secure Connections is an enhanced security feature introduced in Bluetooth 4.2.&amp;quot; This module is not for Bluetooth 4.1, as it was introduced in version 4.2, and is present in version 5 and 5.1 as well. You&amp;#39;re right that the module link is better suited once you start development, but the blog link should be a nice introduction to the LE Secure Connections.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Simon&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Software Security of NRF52832</title><link>https://devzone.nordicsemi.com/thread/225676?ContentTypeID=1</link><pubDate>Mon, 16 Dec 2019 13:57:32 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f0a225b3-ad1b-4ddb-92b0-0568554b3417</guid><dc:creator>manoj12345</dc:creator><description>&lt;p&gt;I your last reply&amp;nbsp;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://infocenter.nordicsemi.com/index.jsp?topic=%2Fsdk_nrf5_v16.0.0%2Fgroup__nrf__ble__lesc.html&amp;amp;resultof=%22%4c%45%53%43%22%20%22%6c%65%73%63%22%20"&gt;https://infocenter.nordicsemi.com/index.jsp?topic=%2Fsdk_nrf5_v16.0.0%2Fgroup__nrf__ble__lesc.html&amp;amp;resultof=%22%4c%45%53%43%22%20%22%6c%65%73%63%22%20&lt;/a&gt;&lt;span&gt;. it just the information of the statements used regarding LESC. It doesn&amp;#39;t tells how it works.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;One more thing, is LESC module is only for Bluetooth 4.1. because in the blog&amp;nbsp;&lt;a href="https://www.bluetooth.com/blog/bluetooth-pairing-part-4/"&gt;https://www.bluetooth.com/blog/bluetooth-pairing-part-4/&lt;/a&gt;&amp;nbsp;it is mentioned liked that.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Software Security of NRF52832</title><link>https://devzone.nordicsemi.com/thread/225670?ContentTypeID=1</link><pubDate>Mon, 16 Dec 2019 13:49:38 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:a921236b-7636-4f9e-b360-a7ab326eb68d</guid><dc:creator>Simonr</dc:creator><description>&lt;p&gt;Hi&lt;/p&gt;
&lt;p&gt;I linked to the LESC module in my last reply with this link&amp;nbsp;&lt;a href="https://infocenter.nordicsemi.com/index.jsp?topic=%2Fsdk_nrf5_v16.0.0%2Fgroup__nrf__ble__lesc.html&amp;amp;resultof=%22%4c%45%53%43%22%20%22%6c%65%73%63%22%20"&gt;https://infocenter.nordicsemi.com/index.jsp?topic=%2Fsdk_nrf5_v16.0.0%2Fgroup__nrf__ble__lesc.html&amp;amp;resultof=%22%4c%45%53%43%22%20%22%6c%65%73%63%22%20&lt;/a&gt;. You&amp;nbsp;can also check out this thread from the official Bluetooth blog:&amp;nbsp;&lt;a href="https://www.bluetooth.com/blog/bluetooth-pairing-part-4/"&gt;https://www.bluetooth.com/blog/bluetooth-pairing-part-4/&lt;/a&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Software Security of NRF52832</title><link>https://devzone.nordicsemi.com/thread/225660?ContentTypeID=1</link><pubDate>Mon, 16 Dec 2019 13:32:41 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:9b60a421-61de-4ab3-a395-f0c492a49173</guid><dc:creator>manoj12345</dc:creator><description>&lt;p&gt;can you refer me any document or link to study about LESC&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Software Security of NRF52832</title><link>https://devzone.nordicsemi.com/thread/225651?ContentTypeID=1</link><pubDate>Mon, 16 Dec 2019 13:12:09 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:810586a9-eba7-4d26-9080-ee35ccccd3f3</guid><dc:creator>manoj12345</dc:creator><description>&lt;p&gt;Ok. I want know what is this LESC before peeping into the code&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Software Security of NRF52832</title><link>https://devzone.nordicsemi.com/thread/225630?ContentTypeID=1</link><pubDate>Mon, 16 Dec 2019 12:38:01 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:a2a37fd2-7a61-4a0c-b7e1-4150f49da866</guid><dc:creator>Simonr</dc:creator><description>&lt;p&gt;Hi Manoj&lt;/p&gt;
&lt;p&gt;There are multiple ways to ensure the safety of your data during Bluetooth communication. I suggest you check out the ble_app_hrs and ble_app_hrs_c examples, which uses&amp;nbsp;the &lt;a href="https://infocenter.nordicsemi.com/index.jsp?topic=%2Fsdk_nrf5_v16.0.0%2Fgroup__nrf__ble__lesc.html&amp;amp;resultof=%22%4c%45%53%43%22%20%22%6c%65%73%63%22%20"&gt;LESC module&lt;/a&gt;&amp;nbsp;and bonding to keep the data safe.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Simon&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>