this is because i was assuming that once the GPU is compromised and said attacker edits boot files which can not be verified from my understanding makes this probable :/ , my bad if i am like just throwing anything to see if it'll stick to my theory , what im trying to do is see if there is a legitimate means of persistence through the avenue i mentioned.persistent storage on a Pi outside of the primary storage media and whether or not the "GPU firmware" can be compromised.
the eeprom could be flashed every boot using that recovery sd ok. but if the boot configuration is compromised, the only solution would be to create a clean install and run that, then whalla system clean as if sold by manufacturer.?
i have a rpi4 that i ran a rpi-update on and even after this recovery method using rpi imgr it does not properly boot into the operating system , i am seeing raspberrypi-exp-gpio soc:firmware:expgpio: (pardon me i have no idea what im talking about) so im assuming that writes to kernel are possible that can persist after reboot ?
Statistics: Posted by notraddude — Wed Apr 10, 2024 10:32 pm