Hi,
I am using core3, with some propriatory software running on it.
Is there a way to disable usage of USB? So users can't mount the internal emmc using rpi-boot driver.
Steps should be something like this:
- Install jessi on revpi.
- Deploy the software and configurations to it
- Enable SSH
- Disable USB <---- This is what I am looking for.
So, the only way to access revpi is thorough LAN.
I want to do this, to prevent any user from mounting the internel emmc and read it.
Disable USB for application protection
Re: Disable USB for application protection
There is only the hard way: Get some super glue and put 3 drops into the connector 
Honetsly: The boot procedure is something very deep in the compute module and there is no way to change the boot ROM in the Broadcom SoC. And this boot ROM does simply monitor a GPIO which is driven by the USB +5V to switch between the 2 available boot possibilities. So that is very very close to the hardware and there is no software way to change the boot mechanism. If you have a look in the circuit drawing you may sse that there is a FET in the signal pathway form USB 5 V to the GPIO which controls the boot process. If you have just a few systems you could manipulate the circuit at this point. But this is definitly no solution for a larger series of products.
If you want to protect your software you could bind it to the hardware using the secure chips serial number. Thus a copy of your software would not work on a differnt hardware.

Honetsly: The boot procedure is something very deep in the compute module and there is no way to change the boot ROM in the Broadcom SoC. And this boot ROM does simply monitor a GPIO which is driven by the USB +5V to switch between the 2 available boot possibilities. So that is very very close to the hardware and there is no software way to change the boot mechanism. If you have a look in the circuit drawing you may sse that there is a FET in the signal pathway form USB 5 V to the GPIO which controls the boot process. If you have just a few systems you could manipulate the circuit at this point. But this is definitly no solution for a larger series of products.
If you want to protect your software you could bind it to the hardware using the secure chips serial number. Thus a copy of your software would not work on a differnt hardware.
Unser RevPi Motto: Don't just claim it - make it!
Re: Disable USB for application protection
Hello everyone, we no longer recommend this procedure of filling the micro-USB socket with adhesive to make it unusable:
viewtopic.php?p=3343#p3343
viewtopic.php?p=3343#p3343
-
- Posts: 1
- Joined: 09 Dec 2024, 13:16
Re: Disable USB for application protection
Ok, thanks.
Re: Disable USB for application protection
Hi, I have this same question. How to prevent access to the intellectual property on the device when the customer will have physical access to the device.
I am concerned about both RpiBoot access through the micro-usb, and also whether it is possible to simply boot into a different operating system from a usb drive and copy the files off the emmc.
My colleagues wanted to put super glue into the USB port and I came on here hoping to find a better solution!!
I see you do not recommend this, but what do you recommend instead?
I am concerned about both RpiBoot access through the micro-usb, and also whether it is possible to simply boot into a different operating system from a usb drive and copy the files off the emmc.
My colleagues wanted to put super glue into the USB port and I came on here hoping to find a better solution!!
I see you do not recommend this, but what do you recommend instead?