ESP8266 Developer Zone The Official ESP8266 Forum 2015-05-24T12:20:12+08:00 https://bbs.espressif.com:443/feed.php?f=7&t=445 2015-05-24T12:20:12+08:00 2015-05-24T12:20:12+08:00 https://bbs.espressif.com:443/viewtopic.php?t=445&p=1839#p1839 <![CDATA[Re: Firmware protection]]>


btw,
eagle.rom.addr.v6.ld
how this hw function to be use?

aes_decrypt = 0x400092d4
aes_decrypt_deinit = 0x400092e4
aes_decrypt_init = 0x40008ea4
aes_unwrap = 0x40009410

_rom_store = 0x4000e388
_rom_store_table = 0x4000e328

there are MD5, SHA and more availabel...

we have more protection availabel!?
are there api function ;-) ;-) ;-)

;-)

best wishes
rudi ;-)

Statistics: Posted by rudi — Sun May 24, 2015 12:20 pm


]]>
2015-05-18T20:43:10+08:00 2015-05-18T20:43:10+08:00 https://bbs.espressif.com:443/viewtopic.php?t=445&p=1720#p1720 <![CDATA[Re: Firmware protection]]>
thks for your reply. As far as i know, that´s only a partial solution, since contents of flash memory can still be read and programmed into another ESP8266 module.

Am i wrong here?


Rgds,


Horacio

Statistics: Posted by hdrut — Mon May 18, 2015 8:43 pm


]]>
2015-05-18T11:03:31+08:00 2015-05-18T11:03:31+08:00 https://bbs.espressif.com:443/viewtopic.php?t=445&p=1718#p1718 <![CDATA[Re: Firmware protection]]> burn a key which is generated from chip-id to flash.
After boot, check chip id and the key value , run while(1) if not match.

Statistics: Posted by costaud — Mon May 18, 2015 11:03 am


]]>
2015-05-18T00:09:27+08:00 2015-05-18T00:09:27+08:00 https://bbs.espressif.com:443/viewtopic.php?t=445&p=1714#p1714 <![CDATA[Re: Firmware protection]]> This product is not secure by any means.

If you wish to make it something that it is not (eg. secure), then your most probable bet is to destroy the UART pins. Might even do it with electricity.

For updating mechanisms, you can come up with a wireless and encrypted method.

Statistics: Posted by raz123 — Mon May 18, 2015 12:09 am


]]>
2015-05-17T23:02:09+08:00 2015-05-17T23:02:09+08:00 https://bbs.espressif.com:443/viewtopic.php?t=445&p=1712#p1712 <![CDATA[Re: Firmware protection]]>

I'm also interested in this topic. There is the possibility of encrypting the contents of flash memory. I have asked this question before to people at Espressif with no luck.
Hope we can all push harder to get this feature up and running. It´s really important for commercial applications.

Greetings,


Horacio

Statistics: Posted by hdrut — Sun May 17, 2015 11:02 pm


]]>
2015-05-17T22:58:40+08:00 2015-05-17T22:58:40+08:00 https://bbs.espressif.com:443/viewtopic.php?t=445&p=1711#p1711 <![CDATA[Re: Firmware protection]]> Statistics: Posted by joostn — Sun May 17, 2015 10:58 pm


]]>
2015-05-17T18:13:11+08:00 2015-05-17T18:13:11+08:00 https://bbs.espressif.com:443/viewtopic.php?t=445&p=1708#p1708 <![CDATA[Re: Firmware protection]]> Statistics: Posted by anihilator — Sun May 17, 2015 6:13 pm


]]>
2015-05-16T22:41:46+08:00 2015-05-16T22:41:46+08:00 https://bbs.espressif.com:443/viewtopic.php?t=445&p=1705#p1705 <![CDATA[Re: Firmware protection]]>
anihilator wrote:
Hi,

We developed some application for ESP8266 directly flashed via UART. Problem is anybody can readout our code out via UART. Is there any solution to protect our code inside ESP8266?
Thx for possible help.


Physically kill the UART pins.

Statistics: Posted by raz123 — Sat May 16, 2015 10:41 pm


]]>
2015-05-15T22:05:56+08:00 2015-05-15T22:05:56+08:00 https://bbs.espressif.com:443/viewtopic.php?t=445&p=1701#p1701 <![CDATA[Firmware protection]]>
We developed some application for ESP8266 directly flashed via UART. Problem is anybody can readout our code out via UART. Is there any solution to protect our code inside ESP8266?
Thx for possible help.

Statistics: Posted by anihilator — Fri May 15, 2015 10:05 pm


]]>