On Fri, May 6, 2016 at 12:39 AM, Kathappan E
wrote:
> Hi all,
>
>
>
> I am able to build Coreboot with FSP Baytrail release
> binary(BAYTRAIL_FSP_GOLD_004_22-MAY-2015.fd).
>
>
>
> But I am unable to build with FSP Baytrail debug binary
>
Hi,
Please find the latest report on new defect(s) introduced to coreboot found
with Coverity Scan.
148 new defect(s) introduced to coreboot found with Coverity Scan.
92 defect(s), reported by Coverity Scan earlier, were marked fixed in the
recent build analyzed by Coverity Scan.
New
On 06.05.2016 09:49, Patrick Rudolph wrote:
> On 2016-05-06 02:45 AM, Zheng Bao wrote:
>> Is there any way to protect the binary image in flash chip from being
>> copied? Once the customers
>> gets the image, they can produce millions of board and do not tell me.
>> I just want to know the
>>
Hi Zheng,
it is really hard to do that. I guess you'll need to have platform support
for such a feature. Maybe you could ask Christopher Tarnovsky
about such technologies (chris.tarnov...@ioactive.com). He is a
kind guy and an expert when it comes to security chips/technologies
on the hardware
On 2016-05-06 02:45 AM, Zheng Bao wrote:
> Hi, All,
> Is there any way to protect the binary image in flash chip from being
> copied? Once the customers
> gets the image, they can produce millions of board and do not tell me.
> I just want to know the
> amount of the mass production.
>
> OTP
On Thu, May 5, 2016 at 8:39 PM, Zheng Bao wrote:
> I don't protect my source. I gave the source to customers. I just want to
> protect binary.
> Customer doesnt know how to build.
>
> In a business, customer dont tell the correct production amount as what is
> wrote in the
Hello Kathappan,
As my understanding is (I might be wrong, please, others correct), you
should have the whole Coreboot + BYT-I FSP build of maximum 2MB (last/top
2MB on the top of 8MB board SPI flash). The line:
*E: Could not add [fsp, 294912 bytes (288 KB)@0x1bff00]; too big?*
Says that you
2016-05-06 6:49 GMT+02:00 Persmule :
> DRM methods cannot "protect" anything. They can only do harm to end users.
That's an interesting statement for a political outreach discussion
group (although the relevant activist groups probably beat that
particular horse to death
8 matches
Mail list logo