79461192

Date: 2025-02-23 12:15:50
Score: 1
Natty:
Report link

Now, your point about Autoboot and encryption is spot-on. Many embedded devices prioritize convenience and cost over security. Autoboot means the device needs to load the kernel and root filesystem without user interaction—no password prompt, no decryption step. For that to work, the storage typically can’t be fully encrypted, because the bootloader would need a way to access a decryption key automatically. If there’s no secure hardware module (like a TPM or HSM) to store that key—and many cheap embedded systems don’t have one—the key would have to be plaintext somewhere on the device, defeating the purpose. So, yeah, in a lot of cases, the NAND or eMMC is left unencrypted to keep things simple and fast.

That said, some devices could use encryption and still autoboot, but it requires more sophistication. For example, a secure boot chain with a trusted execution environment (TEE) could store keys and decrypt the filesystem transparently. Or the bootloader could pull a key from a fused hardware register (like eFuses or OTP memory) that’s inaccessible after manufacturing. High-end embedded systems—like some automotive ECUs or IoT devices from bigger vendors—might do this. But the average off-the-shelf board or hobbyist-grade hardware? Probably not. It’s too expensive or complex for the use case.

So, what stops an attacker from desoldering and reading the storage? Practically speaking, not much beyond physical effort and know-how. The real barriers are:

  1. Skill and Equipment: Desoldering NAND or eMMC isn’t trivial—BGA packages require a hot air station or reflow oven, and you need a compatible reader. It’s not plug-and-play like popping an SD card into a laptop.
  2. Write Protection: Some chips have hardware write-protect pins or OTP regions, but these don’t stop reading—just modification.
  3. Obfuscation: The data might be scrambled in a proprietary format, but that’s not encryption and can often be reverse-engineered.
  4. Tamper Resistance: Higher-end devices might use epoxy or secure enclosures to make desoldering a nightmare, but that’s rare in the boards you’re likely looking at.

If the device isn’t encrypted—and with Autoboot enabled, it probably isn’t—then desoldering gives the attacker everything. The “UART and JTAG disabled = secure” claim is more about reducing low-hanging fruit for casual attackers, not stopping a determined one with physical access. For real security, you’d need encrypted storage, secure boot, and ideally some anti-tamper measures—all of which add cost and complexity most vendors skip unless they’re forced to care.

Reasons:
  • Long answer (-1):
  • No code block (0.5):
  • Contains question mark (0.5):
  • Low reputation (1):
Posted by: Ahamad