11 Jun
2015
11 Jun
'15
2:24 a.m.
On 6/9/15, Christian Gagneraud <chgans@gna.org> wrote:
... so with physical access to the hardware you can ...
if your threat model is NSA, and they get arbitrary physical access, you have concerns much larger than insecure default JTAG configurations... i'd be happy with a device providing system JTAG controller restrictions (IEEE 1149.1, 1149.6) bound by efuses. most of these features go un-used in practice. :/ best regards,