You don't have to obscure it. You have to make it difficult or impossible to change it. I did forget to add one item to my list: have the basic bootstrap in ROM, which will load the firmware image from flash and check its signature using the company's public key.
...
The point of my message wasn't to illustrate how to make it impossible to hack your way towards enabling features. It was to illustrate that we know that these companies want their devices to be easily hacked, because they're not taking the rather trivial steps needed to make it difficult enough to do that most wouldn't try (there's a world of difference between a device being "hackable" by way of a simple key generator, a la a number of the Siglent devices, and it being "hackable" by directly flashing the firmware via JTAG or something).
This is not correct. KS has done a lot of work in trying to make if hard to hack the enablement of features. They have had one of the best methods around.
First, all the points in your first message are currently implemented by KS.
Secondly, the secure boot process that you describe in the 2nd message is the most important thing and you missed that one in the 1st msg.
The "impossible to change it" is almost impossible as you have access to the device HW but, that, would be definitely a new ballgame .
But, this go against the nature of the very own feature we're trying to protect: enhancement on the field. A secure boot process could introduce problems in the servicing of these units making them harder to service.
It's not like PS/XBOX quantities where, if you have a problem, they replace with a new and get on with it.
This...
People who are not in security industry at all (no knowledge at all) and people who are professionally in security industry have same problem in common: they disregard how expensive security is.
First one think it's cheap so it should be done to the fullest, because they think it's free and have no negatives, so why not.
People in security industry OTOH, have no regards or even perception of limits where security is getting to expensive, and too damn taxing to people and and how it interferes with actual work trying to be done here. They are aware of the price but don't care. Somebody else is paying. As long as they follow the latest trends that don't have connection to reality anymore..
One company I consult for, just introduced 15 CHARACTER passwords (at least one number, capital letter, letter and special character) for login to Windows Domain.
They think they are more secure now. There cannot be any hacker attacks on this, right? From my real life experience, they just plummeted security to efin zero.
First thing people did was to write the passwords down on PostIT note papers and stick it to the monitor.
Because , 95% of people working in their offices cannot be expected to remember that shit.
Not to mention they had like 1000% increase in locked accounts, because when people want to log in to windows in a hurry, then typing 15 characters blindly (yeah no peeking, that is insecure, someone could read it from the screen. If your PostIT note has bad handwriting).
Support is overwhelmed.People are livid. And security is zero. Passwords are all over the place, stuck to the monitors.
Security "Experts" don't care. They read it in some magazine that is a modern thing to do nowadays or whatever.
It is not that they designed retarded, unrealistic security solution.
No, problem is them people are not following rules.
WTF happened to risk analysis? What is the cost/benefit here, security wise? How is that good security?
Same thing with scopes. Creating a secure WORKFLOW for the whole scope company, costs a LOT of money and drops productivity. It is not as if: you zip it and it's secure.
It has to be secured from beginning to the end. You can have everything secured, if someone leaks keys, bye bye.. So suddenly, you're not scope company anymore. You're running a military facility, with pat downs to see if someone tries to bring in forbidden surveillance equipment. No phones or communication devices on the premises. Partitioned offices with security clearances. Regulated paths to bathrooms and cafeteria. Security staff that supervises implementation. SIGINT monitors for 24/7 monitoring of illicit communications equipment. Human resources doing background checks.... Down the rabbit hole.
And customer pays for it...
Not doing same type of security like Keysight or R&S , by Siglent and Rigol, is also part of savings passed on to customers.
So yeah, they made the right decision... If few hobby users hack the scope, that is not important.
Also hackability has dick squat influence to purchasing decisions of professional users. Companies perform regular inventories and actively monitor all IT equipment to make sure nobody installed illegal software and licenses to any equipment. They think the same about this too..
And why would you even consider that: Keysight Full Bundle for 3000T series is like 2500€ +VAT. Siglent SDS2350X+ can be had for that money. With most protocols included.
Companies think like that. Even when you pay full price, Siglent equipment is good deal compared...