Anonymous
7/22/2025, 9:29:55 PM
No.105991108
>>105990709
>It's literal glowie tech that runs signed code from ARM in parallel to your OS
>>105990736
>ARM is backdoored as much as Intel/AMD is.
You're delusional. TrustZone is an *optional* isolation extension that is started voluntarily by the OS (in contrast to Intel ME and AMD PSP which are always running). The code running on it is *uploaded by the main OS* during the boot process then locked after bootup is complete. The "firmware" is the EL3 secure monitor whose singular task is to manage world switching and is restricted the same as any other firmware, via IOMMU. The trusted world does not get 99% of the peripherals including networking since they are assigned to the non-trusted world.
>backdoored in the Titan chip.
The Titan chip is the Pixel equivalent of Apple's secure enclave. Neither have main RAM/internet/peripheral access. They are both physically isolated from the main CPU and have their own isolated RAM region. It wouldn't make sense to connect them to the internet anyway - their literal task is to be as secure as possible even when the main CPU and TrustZone are compromised. They are responsible for data encryption and hardware-backed delays for passcode cooldowns, (Apple calls this lockboxes, Google/Android calls it Weaver keys) among other things. They're made to be resistant from physical attacks like glitching. It's quite literally the opposite of a backdoor - it's designed to be as secure as possible so even if you physically have the device and can access the chip you still can't get data out of the device.
The Indian chip is even largely open source: https://opentitan.org/book/sw/index.html
>It's literal glowie tech that runs signed code from ARM in parallel to your OS
>>105990736
>ARM is backdoored as much as Intel/AMD is.
You're delusional. TrustZone is an *optional* isolation extension that is started voluntarily by the OS (in contrast to Intel ME and AMD PSP which are always running). The code running on it is *uploaded by the main OS* during the boot process then locked after bootup is complete. The "firmware" is the EL3 secure monitor whose singular task is to manage world switching and is restricted the same as any other firmware, via IOMMU. The trusted world does not get 99% of the peripherals including networking since they are assigned to the non-trusted world.
>backdoored in the Titan chip.
The Titan chip is the Pixel equivalent of Apple's secure enclave. Neither have main RAM/internet/peripheral access. They are both physically isolated from the main CPU and have their own isolated RAM region. It wouldn't make sense to connect them to the internet anyway - their literal task is to be as secure as possible even when the main CPU and TrustZone are compromised. They are responsible for data encryption and hardware-backed delays for passcode cooldowns, (Apple calls this lockboxes, Google/Android calls it Weaver keys) among other things. They're made to be resistant from physical attacks like glitching. It's quite literally the opposite of a backdoor - it's designed to be as secure as possible so even if you physically have the device and can access the chip you still can't get data out of the device.
The Indian chip is even largely open source: https://opentitan.org/book/sw/index.html