Switch 2: Tegra T239: Difference between revisions
Moved to page Security_Mitigations. |
|||
| Line 36: | Line 36: | ||
There is no memory authentication, however. So in the event of external memory tampering, the CPU will read back garbled plaintext (effectively, random bytes). Although, it should in principle be possible to "replay" earlier values from a particular address. | There is no memory authentication, however. So in the event of external memory tampering, the CPU will read back garbled plaintext (effectively, random bytes). Although, it should in principle be possible to "replay" earlier values from a particular address. | ||