Hello,
unfortunately no, they do not end up the same.
just a very quick summary from what i have to assume according to what is stated on the Nitropad website:
In general, i see the following issues:
Assuming they use Heads' Pursim code for generic key generation/export of the public key/insertion into the ROM and flashing it back:
1: That would mean they use default Pins, therefor its possible to intercept the whole process at any point (compromising the firmware and resealing the key)
2: No reproducible builds.
3: Were can the code be found, which version?
No public CI, no public builds artifacts.
Also, about the shipping: I cant see any security benefit the way they do it (Qr code not send by secure communication)?
Keep in Mind, i might be wrong with this assumptions, as i dont have a Nitropad/ cant install their Image because of the issues i mentioned (2/3)
About installing a different OS: Thats possible.
About the Wifimodule: Apart from other reasons,the default Intel 6205 sucks anyway, I suggest Atheros 9380.
Pursim products cant compare security wise with the PrivacyBeast/
Nitropad/ any x30 series Lenovo with coreboot because of the
hardware architecture they use.
cheers
--
You received this message because you are subscribed to the Google Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/93fd27f8-2838-43c3-9f84-0c3865382d0d%40googlegroups.com.
Apologies for changing the subject. But this would be a good time to ask the last poster, or anyone else, do you have any experience with the project, I now face, flashing Core Boot onto a Lenovo X 230? Last Poster seems to have more knowledge than I in hardware.
Thanks for correction. Details are more important than impressions.