Trusted Boot within redpesk OS
One of the increasingly requested features in embedded systems is to improve the security of the exploitation system. Indeed, more and more embedded devices represent opened doors thanks to a poor security manage either in the hardware or in the software: memory corruption, denial of services, privileges escalation, buffer overflow, gain information, directory traversal…
The IoT.bzh team is always interested in developing the security aspects of redpesk OS. One of the functionalities which is still in development is the Trusted Boot. What is it? How can it improve the system security? Can I use it in my embedded project?
Please refer to the dedicated Trusted Boot chapter for more details about this feature.