diff --git a/static/install/cli.html b/static/install/cli.html index e8e46834..1d6a8d2a 100644 --- a/static/install/cli.html +++ b/static/install/cli.html @@ -556,9 +556,9 @@ curl -O https://releases.grapheneos.org/DEVICE_NAME-install-VERS OS, it can be detected with these features.
Verified boot verifies the entirety of the firmware and OS images on every - boot. The public key for the firmware images is burned into fuses in the SoC - at the factory. Firmware security updates can also update the rollback index - burned into fuses to provide rollback protection.
+ boot. The public key for the firmware images is burned into fuses in the SoC at + the factory. Firmware security updates also update the rollback index burned + into fuses to provide rollback protection.The final firmware boot stage before the OS is responsible for verifying it. For the stock OS, it uses a hard-wired public key. Installing GrapheneOS diff --git a/static/install/web.html b/static/install/web.html index 06c12f9b..ce1142a7 100644 --- a/static/install/web.html +++ b/static/install/web.html @@ -360,9 +360,9 @@ OS, it can be detected with these features.
Verified boot verifies the entirety of the firmware and OS images on every - boot. The public key for the firmware images is burned into fuses in the SoC - at the factory. Firmware security updates can also update the rollback index - burned into fuses to provide rollback protection.
+ boot. The public key for the firmware images is burned into fuses in the SoC at + the factory. Firmware security updates also update the rollback index burned + into fuses to provide rollback protection.The final firmware boot stage before the OS is responsible for verifying it. For the stock OS, it uses a hard-wired public key. Installing GrapheneOS