Switch 2: Tegra T239: Difference between revisions
Moved to page Security_Mitigations. |
|||
| (One intermediate revision by the same user not shown) | |||
| Line 36: | Line 36: | ||
There is no memory authentication, however. So in the event of external memory tampering, the CPU will read back garbled plaintext (effectively, random bytes). Although, it should in principle be possible to "replay" earlier values from a particular address. | There is no memory authentication, however. So in the event of external memory tampering, the CPU will read back garbled plaintext (effectively, random bytes). Although, it should in principle be possible to "replay" earlier values from a particular address. | ||