There is a common philosophical debate regarding whether open source software contributes to more secure embedded systems; whereas proprietary or closed source software hinders attacks by making reverse engineering more difficult. Contradictory, highly utilized open source software benefits from the use of many developers. For active community software projects the unsolicited reviews by all types of users and subsequent bug fixes which are made contribute to the quality of the final software. The opportunity for more robust implementations is there.
It was great to see the participation, questions and feedback in our recent security webinar series where we leveraged open source components to implement a secure boot. As with open source software, the feedback shared by all webinar participants will benefit all developers. So, in this blog, we will review and address the questions and comments made during our most recent webinar (Designing Secure IoT Devices Starts with a Secure Boot) to provide a path for stronger security implementations for IoT edge nodes.
Webinar Survey Feedback
At the end of the webinar, attendees were given the opportunity to provide their feedback, and for those who did – thank you very much! The predominant feedback was that the content should focus more on the architecture and theory, than on the specific product level details.
Live Webinar Questions
During the webinar, there were more than 30 questions asked. We, unfortunately, didn’t have time to address all of them, but we appreciate the real-time feedback! Let’s have a look at a couple of topics raised that were not part of the recording.
For additional questions or comments, please feel free to email me, or post a comment on this blog to share your questions with others.