Imagine SD card but the FORCE ERASE command also resets PERM_WRITE_PROTECT
Wait no, that's useless, since a rogue host can read the whole card before erasing it, and then write modified content back.
Damn.
Imagine SD card but with the ability to write-protect it in such a way, that un-write-protecting requires a password.
or I could just buy a bunch of those cards and use the permanent write-protect....
@Suiseiseki
> [PERM_WRITE_PROTECT] is implemented by the reader, not the card, so you can just ignore than flag.
Citation needed.
The SD spec says the physical write-protect switch on the side of the card is only implemented by the reader, but that's a separate thing from the PERM_WRITE_PROTECT bit in the CSD register.
1/
@Suiseiseki
> an attacker can [...] dump out all blocks.
not a concnern
> You're better of encrypting the cards with LUKS2
that misses the point.
I need an untrusted computer to be able to read the content of the card, without being able to modify it.
Also, can you stop being patronizing?
Not everyone has the same threat model as you, not everyone is trying to solve the same problem as you, and if LUKS was the answer I would've figured that out myself.
@Suiseiseki did you know that USB DVD readers have microcontrollers in them, running proprietary software?
@Suiseiseki but the attacker can reprogram the drive to return bytes different than the ones actually on the disc
@Suiseiseki flipping one byte in the right place is probably enough for the attacker to win