Add sources.

This commit is contained in:
inference 2022-11-03 05:24:14 +00:00
parent c0e2332b7c
commit eafec813ac

View File

@ -65,17 +65,22 @@
which prevents an adversary from rolling back the OS or firmware version to a which prevents an adversary from rolling back the OS or firmware version to a
previous version with known security vulnerabilities.<br> previous version with known security vulnerabilities.<br>
<br> <br>
They also include a hardware security module They also include a
(Titan M2, improving on the first generation <a class="table-link" href="https://security.googleblog.com/2018/10/building-titan-better-security-through.html">Titan M</a>) <a class="table-link" href="https://developer.android.com/training/articles/keystore#HardwareSecurityModule">hardware security module</a>
(Titan M2, improving on the first generation
<a class="table-link" href="https://security.googleblog.com/2018/10/building-titan-better-security-through.html">Titan M</a>)
which is extremely resistant to both remote and physical attacks due to being which is extremely resistant to both remote and physical attacks due to being
completely isolated from the rest of the system, including the operating system. completely isolated from the rest of the system, including the operating system.
Titan M2 ensures that the device cannot be remotely compromised by requiring the Titan M2 ensures that the device cannot be remotely compromised by requiring the
side buttons of the device to be physically pressed for some sensitive operations. side buttons of the device to be physically pressed for some sensitive operations.
Titan M2 also takes the role of Android Strongbox keystore, containing sensitive user Titan M2 also takes the role of
keys which are unavailable to the OS or apps running on it without authorisation from <a class="table-link" href="https://source.android.com/docs/security/best-practices/hardware#strongbox-keymaster">Android Strongbox Keymaster</a>,
Titan M2 itself. Insider attack resistance ensures that Titan M2 firmware can be flashed a <a class="table-link" href="https://source.android.com/docs/security/features/keystore">hardware-backed Keystore</a>
only if the user PIN/password is already known, making it impossible to backdoor the device containing sensitive user keys which are unavailable to
without already knowing these secrets.<br> the OS or apps running on it without authorisation from Titan M2 itself. Insider attack
resistance ensures that Titan M2 firmware can be flashed only if the user PIN/password
is already known, making it impossible to backdoor the device without already knowing
these secrets.<br>
<br> <br>
Google Pixel device kernels are compiled with fine-grained, forward-edge control-flow Google Pixel device kernels are compiled with fine-grained, forward-edge control-flow
integrity and backward-edge control-flow integrity to prevent code reuse attacks against integrity and backward-edge control-flow integrity to prevent code reuse attacks against