Hello James,

Nice to meet you! It's good that you posted on the mailing list.

Yes it would be very interesting to discuss your idea. From what you
said, it seems like a new programmer can be part of group_internal. I
think there is no support for windows in the group_internal at the
moment, but maybe it could be.

What phase are you currently in, do you have some experimental code
working already?
I understand the driver you are writing, it's all yours, so from
flashrom side the question would be how to fit the new support into
flashrom code.

Are there any proprietary libraries involved in the implementation? Or
in general, any new dependencies would be needed?

Will you be able to do the testing in your environment?

How would you like to discuss in more detail? We can talk in this
thread, it's also possible someone else sees the post and joins. In
case you already looked into how to add this to flashrom, you can even
create a quick experimental patch? It can be a way to explain your
idea.

Thank you so much for the nice words about flashrom. It's the
collective work of so many people over decades :)
https://flashrom.org/about_flashrom/hall_of_fame.html

On Fri, Sep 5, 2025 at 7:45 PM madam smith <[email protected]> wrote:
>
> Hi Flashrom team,
>
> I'm a forensic engineer focused on hardware-level validation and SPI flash 
> access across locked platforms. I've worked extensively on probing SPI flash 
> from T2 MacBooks and similar devices, and recently developed a custom Windows 
> kernel-mode driver for MMIO mapping and SPI controller access.
>
> As part of this work, I’ve begun creating a signed kernel-mode driver 
> designed to enable internal SPI flash access on Windows—particularly for 
> platforms where external programmers aren’t viable or where forensic 
> traceability is essential. The driver emphasizes modularity, context 
> preservation, and empirical validation, and I’m exploring how it could 
> interface with Flashrom’s internal programmer logic.
>
> I understand Flashrom currently relies on external drivers like WinRing0 or 
> portio.sys for low-level access on Windows, but these solutions are unsigned, 
> fragile, and often flagged by modern security tools. I’d like to ask whether 
> the team would be open to discussing the possibility of integrating or 
> supporting a signed kernel-mode driver for secure internal access on Windows.
>
> If there’s interest, I’d be happy to share technical details, constraints, 
> and potential implementation paths. I deeply appreciate the work you’ve done 
> on Flashrom—it’s an invaluable tool for the hardware security and research 
> community.
>
> Best regards,
> James
>
>
> _______________________________________________
> flashrom mailing list -- [email protected]
> To unsubscribe send an email to [email protected]



-- 
Anastasia.
_______________________________________________
flashrom mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to