From 7f2efb68f90233299c390387ebf7284a600b5d4a Mon Sep 17 00:00:00 2001 From: dehanj Date: Wed, 6 Sep 2023 11:16:28 +0200 Subject: [PATCH] Inclulde the latest release tk1-23.03-2-Bellatrix --- doc/threat_model/threat_model.md | 12 +++++++++--- 1 file changed, 9 insertions(+), 3 deletions(-) diff --git a/doc/threat_model/threat_model.md b/doc/threat_model/threat_model.md index 6bc3488..5db84e0 100644 --- a/doc/threat_model/threat_model.md +++ b/doc/threat_model/threat_model.md @@ -176,12 +176,12 @@ are out of scope and what mitigations are in place. ### TKey Unlocked -Note that the trust model as desribed for the TK1-23.03.1-Bellatrix +Note that the threat model as described for the TK1-23.03.2-Bellatrix release (see below) applies to TKey Unlocked devices as long as the TKey has been provisioned with: -- the Tillitis TKey TK1-23.03.1-Bellatrix FPGA design and Tillitis TKey -firmware. +- the Tillitis TKey TK1-23.03.2-Bellatrix FPGA design and Tillitis + TKey firmware. - A unique, random UDS - A unique UDI @@ -189,6 +189,12 @@ The configuration must have been written into the NVCM and locked by blowing the fuses. +### TK1-23.03.2-Bellatrix +This release contains a BOM update to the Tkey hardware for the touch +capabilites, hence the specific scope for TK1-23.03-1-Bellatrix is +valid for this release. + + ### TK1-23.03.1-Bellatrix This is the first general release of the TKey TK1 end user device. In this