Replicant: Issueshttps://redmine.replicant.us/https://redmine.replicant.us/favicon.ico?15984615062016-03-06T19:25:05ZReplicant
Redmine Replicant - Issue #1659 (In Progress): The device pages don't warn about proprietary (and likely ...https://redmine.replicant.us/issues/16592016-03-06T19:25:05ZPaul Kocialkowskipaulk@replicant.us
<p>Most of the devices currently supported by Replicant (except the GTA04) support TrustZone, which is likely used on most devices. It is likely the reason why manufacturers enforce signed bootloaders while allowing unsigned kernels to run.</p>
<p>TrustZone TEE runs in parallel to and with greater privileges than the regular operating system (Replicant). Since it is proprietary and stored with/loaded by the (signed) bootloader, it is a great threat to both freedom and privacy/security. TrustZone is often used to allow decoding DRM contents without any possibility for the user</p>
However, since little is known about TrustZone TEE implementations (and exactly how it's loaded, how it's contacted), we should do some research about:
<ul>
<li>Whether there are TrustZone bindings in the kernel (e.g. related to DRM decoding).</li>
<li>How the (signed) bootloaders load the TrustZone TEE image and where it is stored. If not part of the bootloader image, knowing whether it is signed would be crucial.</li>
</ul>
<p>Looking at some documentation and known free implementations for that could help (ARM's reference trusted firmware). Some platforms and devices come with more documentation about TrustZone (e.g. i.MX53 and USB armory, Tegra X1).</p>