My guess is they are bypassing some integrity check on signed code by glitching logic in the ASP bootrom. If it’s true then it is very possible there are no fuse banks prepped to patch the bootrom. Which I have seen used to make bootroms patchable.
It’s very hard to protect against glitch attacks. And typically that sort of measure needs to be engineered into the design itself.
I stare at Linux source code very often looking for vulnerabilities.
I unironically have printed pages out to sit down with.
The idea of having the whole kernel printed… is… fun. Lol. How would your organize it for reading? Different chapters that are the directories of the kernel code ?
I need to be honest - that video explained nothing lol