This post is older than 2 years and might not be relevant anymore
More Info: Consider searching for newer posts

secure boot on the nRF52840

Hi Team

From what I learned, the BPROT or ACL can protect the bootloader can not be modified by the application.

But is there any way to protect the chip from erased with "nrfjprog -f nrf52 --eraseall"? Because if the bootloader can be erased, the public key/ the root of trust was broken.

Waiting for your reply. Thanks a lot.

Parents
  • Besides, the comment of NRF_BL_APP_SIGNATURE_CHECK_REQUIRED in sdk_config.h is "Perform signature check on the app. Requires the signature to be sent in the init packet.", does that means the signature check happened after DFU?

    Can I combine the init packet with bootloader+softdevice+application+bootloader setting, and program it into the chip directly?

Reply
  • Besides, the comment of NRF_BL_APP_SIGNATURE_CHECK_REQUIRED in sdk_config.h is "Perform signature check on the app. Requires the signature to be sent in the init packet.", does that means the signature check happened after DFU?

    Can I combine the init packet with bootloader+softdevice+application+bootloader setting, and program it into the chip directly?

Children
Related