Conversation

Replying to
You can only realistically get into this state if you unlock the bootloader. When you unlock the BL, you’ve voluntarily forfeit warranty (at least for software related issues like this one). I’m 100% sure that if your device bricked after a normal OTA, you’ll get a replacement.
2
5
Rollback protection is part of verified boot. It has existed for the SoC boot chain, secure element and the OS itself for many years. Pixels have used it for the OS and secure element for years. It wasn't used in practice for SoC boot chain due to being a development annoyance.
1
2
An important security feature not being fully implemented due to it being a development annoyance is problematic. GrapheneOS is an aftermarket OS focused on Pixels and we wanted this feature to start being used properly and complained about it not being done on the past devices.
2
1
Not everyone using an aftermarket OS wants to roll back the security model and disable security features. Proper verified boot is a small part of what we expect potential hardware partners to implement. It's not proper verified boot if firmware bypasses aren't fixed like this.
1
You're welcome to use something other than GrapheneOS if you don't want the standard security model and hardware-based security features intact. Rollback protection is a basic security feature and has already been used for years, just not for the early SoC boot chain in practice.
2
This firmware also contains the TEE code. Secure element is separate and has separate rollback protection for itself. Both TEE and secure element are part of providing hardware support to make encryption better, and both the TEE and secure element provide hardware keystores too.
2
If you don't have rollback protection, then an attacker can downgrade the TEE and secure element firmware to the oldest published version to have the weakest possible target to attack. TEE is part of SoC firmware and is covered by this SoC rollback protection version.
1
Show replies
The primary threat model for verified boot is defending against a remote attacker trying to persist on the device, not physical security. Anti-tampering is a secondary and less important threat model for verified boot. Chromebooks don't really bother even trying to do that part.
3
1
Show replies