ARM TrustZone in BB?

ARM Cortex A8 has TrustZone. TrustZone is similar to Trusted Platform Module (TPM). Among its uses is digital rights media. See http://mobile.arm.com/products/processors/technologies/trustzone.php?tab=Why+TrustZone?

BB-xM and BeagleBone use an ARM Cortex A8. Cortex A8 has Trust Zone. Do the BB-xM and BeagleBone have TrustZone?

Original BB uses Texas Instrument’s OMAP3350DCBB72 processor. Is that an ARM Cortex? Does it have TrustZone?

Privacy is very important to me. I need a board that does not have TrustZone as it probably reads the processor serial number (PSN) and makes it trackable.

Hi,

Privacy is very important to me. I need a board that does not have
TrustZone as it probably reads the processor serial number (PSN) and
makes it trackable.

TrustZone itself does not have anything to do with any unique identity
of the device nor DRM/TPM. It is just execution mode of the ARM
processor. So that itself should not bring any worry. In order to
utilize TrustZone in system design you need to prepare it for execution
and make it process some software.

What you should be more worried is what software you are using in your
system. All starts from ROM and other firmware's in the system. Unique
identity can be hidden in any SoC's peripherals or outside of the SoC in
external devices. Also you should analyze ASIC designs as not everything
is defined as software terms.

Then again unique identity itself is not bad at all as it is as good as
software you have in the system that is using it.

So better know how every line of Linux kernel is doing, how all user
space programs are doing, what all libraries are doing, how ROM is
working, and how all firmwares in system are doing. It is also about how
you configure _your_ software configuration on the device. And how your
system can communicate outside.

Someone could also sniff where the device is externally so you have a
lot of challenges on determining whether your device matched your design
goals. So better define you fear a bit differently and try to attack
more plausible problems. Basically every today's device have somehow
defined identity. It is either required by regulations or just provided
for usage.

Thanks,
Vesa J��skel�inen