diff --git a/doc/threat_model/threat_model.md b/doc/threat_model/threat_model.md index 6bc3488..5db84e0 100644 --- a/doc/threat_model/threat_model.md +++ b/doc/threat_model/threat_model.md @@ -176,12 +176,12 @@ are out of scope and what mitigations are in place. ### TKey Unlocked -Note that the trust model as desribed for the TK1-23.03.1-Bellatrix +Note that the threat model as described for the TK1-23.03.2-Bellatrix release (see below) applies to TKey Unlocked devices as long as the TKey has been provisioned with: -- the Tillitis TKey TK1-23.03.1-Bellatrix FPGA design and Tillitis TKey -firmware. +- the Tillitis TKey TK1-23.03.2-Bellatrix FPGA design and Tillitis + TKey firmware. - A unique, random UDS - A unique UDI @@ -189,6 +189,12 @@ The configuration must have been written into the NVCM and locked by blowing the fuses. +### TK1-23.03.2-Bellatrix +This release contains a BOM update to the Tkey hardware for the touch +capabilites, hence the specific scope for TK1-23.03-1-Bellatrix is +valid for this release. + + ### TK1-23.03.1-Bellatrix This is the first general release of the TKey TK1 end user device. In this