From 03be1b8687afbeff622d392843567141b1028476 Mon Sep 17 00:00:00 2001
From: Daniel Micay
Verified boot verifies the entirety of the firmware and OS images on every - boot. The public key for the firmware images is burned into fuses in the SoC - at the factory. Firmware security updates can also update the rollback index - burned into fuses to provide rollback protection.
+ boot. The public key for the firmware images is burned into fuses in the SoC at + the factory. Firmware security updates also update the rollback index burned + into fuses to provide rollback protection.The final firmware boot stage before the OS is responsible for verifying it. For the stock OS, it uses a hard-wired public key. Installing GrapheneOS diff --git a/static/install/web.html b/static/install/web.html index 06c12f9b..ce1142a7 100644 --- a/static/install/web.html +++ b/static/install/web.html @@ -360,9 +360,9 @@ OS, it can be detected with these features.
Verified boot verifies the entirety of the firmware and OS images on every - boot. The public key for the firmware images is burned into fuses in the SoC - at the factory. Firmware security updates can also update the rollback index - burned into fuses to provide rollback protection.
+ boot. The public key for the firmware images is burned into fuses in the SoC at + the factory. Firmware security updates also update the rollback index burned + into fuses to provide rollback protection.The final firmware boot stage before the OS is responsible for verifying it. For the stock OS, it uses a hard-wired public key. Installing GrapheneOS