Does that completely nuke or replace all EEPROM content or, as with uploading a '.uf2' file to a Pico, only update parts of it ? Re-flashing MicroPython for example leaves the complete file system intact, needs nuking to remove any secrets that may contain.Run the EEPROM reset to default settings via Rpi Imager? At least, I think I remember seeing that option somewhere.As this thread is a thought experiment, if the Pi 5 secret were known to an adversary and used to install persistence, is there still a guaranteed way to reset the EEPROM to a known good state?
Destroying the Pi to be entirely sure still seems the best path to me. It avoids the risk of risks and figuring out what risks there are, but I appreciate this is just thought experiment.
Statistics: Posted by hippy — Thu Jan 16, 2025 9:57 pm