logoalt Hacker News

Oneplus phone update introduces hardware anti-rollback

271 pointsby validatoritoday at 8:39 PM114 commentsview on HN

Comments

piskovtoday at 10:14 PM

So that’s how in an event of war US adversaries will be relieved of their devices

> The anti-rollback mechanism uses Qfprom (Qualcomm Fuse Programmable Read-Only Memory), a region on Qualcomm processors containing one-time programmable electronic fuses.

What a nice thoughtful people to build such a feature

show 3 replies
jacquesmtoday at 9:20 PM

This goes beyond the 'right to repair' to simply the right of ownership. These remote updates prove again and again that even though you paid for something you don't actually own it.

show 2 replies
scbzzzzztoday at 9:18 PM

What do OnePlus gain from this? Can someone explain me what are the advantages of OnePlus doing all this? A failed update resulting in motherboard replacement? More money, more shareholders are happy?

I still sometimes ponder if oneplus green line fiasco is a failed hardware fuse type thing that got accidentally triggered during software update. (Insert I can't prove meme here).

show 4 replies
zozbot234today at 9:26 PM

According to OP this does not disable bootloader unlocking in itself. It makes the up-versioned devices incompatible with all previous custom ROMs, but it should be possible to develop new ROM releases that are fully compatible with current eFuse states and don't blow the eFuse themselves.

show 1 reply
peterhontoday at 11:10 PM

Unfortunately similar things will be mandated by EU law through cyber resiliance act (CRA) in order to ensure tamper free boot of any kind of device sold in the EU from Dec 2027.

Basically breaking any kind of FOSS or repairability, creating dead HW bricks if the vendor ceases to maintain or exist.

geor9etoday at 10:44 PM

This has been a commonplace feature on SOCs for a decade or two now. The comments seem to be taking this headline as out‑of‑the‑ordinary news, phrased as if Oneplus invented it. Even cheapo devices often use an eFuse as anti-rollback. We do it at my work whenever root exploits are found that let you run unsigned code. If we don't blow an eFuse, then those security updates can just be undone, since any random enemy with hardware access could plug in a USB cable, flash the older exploitable signed firmware, steal your personal data, install a trojan, etc. I get the appeal of ROMs/jailbreaking/piracy but it relies on running obsolete exploitable firmware. It's not like they're forcing anyone to install the security patch who doesn't want it. This is normal.

MarkusWandeltoday at 11:02 PM

That's insane. If the CPU has enough fuses (which according to the wiki it does) why the h*ck can't they just make it impossible to reflash the >= minimum previously installed version of the OS after preventing the downgrade? Why the hard brick?

raizer88today at 9:03 PM

You either die a hero, or live long enough to see yourself become the villain

show 1 reply
userbinatortoday at 10:01 PM

I'm not sure if this is the case anymore, but many unbranded/generic Androids used to be completely unlocked by default (especially Mediatek SoCs) and nearly unbrickable, and that's what let the modding scene flourish. I believe they had efuses too, but software never used them.

tripdouttoday at 9:20 PM

> When the device powers on, the Primary Boot Loader in the processor's ROM loads and verifies the eXtensible Boot Loader (XBL). XBL reads the current anti-rollback version from the Qfprom fuses and compares it against the firmware's embedded version number. If the firmware version is lower than the fuse value, boot is rejected. When newer firmware successfully boots, the bootloader issues commands through Qualcomm's TrustZone to blow additional fuses, permanently recording the new minimum version

What exactly is it comparing? What is the “firmware embedded version number”? With an unlocked bootloader you can flash boot and super (system, vendor, etc) partitions, but I must be missing something because it seems like this would be bypassable.

It does say

> Custom ROMs package firmware components from the stock firmware they were built against. If a user's device has been updated to a fused firmware version & they flash a custom ROM built against older firmware, the anti-rollback mechanism triggers immediately.

and I know custom ROMs will often say “make sure you flash stock version x.y beforehand” to ensure you’re on the right firmware, but I’m not sure what partitions that actually refers to (and it’s not the same as vendor blobs), or how much work it is to either build a custom ROM against a newer firmware or patch the (hundreds of) vendor blobs.

1a527dd5today at 10:04 PM

I look forward to the 1hr+ rant from Louis Rossmann.

show 1 reply
skeledrewtoday at 9:45 PM

This is absolutely cracked. I've been with OnePlus since the One, also getting the 2, 6 and now I have the 12. Stuck with them all these years because I really respected their - original - take on device freedom. I really should've seen the writing on the wall given how much pain it is to update it in the first place, as I have the NA version which only officially allows carrier updates, and I don't live in NA (and even if I did I'd still not be tied to a carrier).

Now I have to consider my device dead re updates, because if I haven't already gotten the killing update I'd rather avoid it. First thing I did was unlock the bootloader, and I intend to root/flash it at some point. Will be finding another brand whenever I'm ready to upgrade again.

show 1 reply
poizan42today at 10:28 PM

Does anyone know if it has been confirmed that this only applies to the "ColorOS" branded firmware versions? Because I currently have an update to OxygenOS 16.0.3.501 pending on my OnePlus 15, which is presumably built from the same codebase.

syntaxingtoday at 9:19 PM

OnePlus has pretty much become irrelevant since Carl Pei left the company. Its more or less just a rebranded Oppo nowadays. I'm not an android user anymore but I'm rooting for his new(ish) Nothing company. Hopefully it carries the torch for the old OnePlus feel.

show 3 replies
Retr0idtoday at 9:15 PM

Blind speculation: I wonder if this is in some way related to DRM getting broken at a firmware level, leading to a choice being made between "users complain that they can't watch netflix" and "users complain that they can't install custom ROMs".

show 1 reply
plutokrastoday at 10:31 PM

Nintendo has been doing this for ages.

https://news.ycombinator.com/item?id=30773214

RugnirVikingtoday at 9:47 PM

isnt this just like... vandalism? nothing could give them the right to do this, they're damaging others property indescriminately.

InsomniacLtoday at 10:29 PM

Does intentionally physically damaging a device fall foul of any laws that a software restriction otherwise wouldn't?

WaitWaitWhatoday at 9:17 PM

Is this for just one or several OnePlus models?

If so, is this 'fuse' per-planned in the hardware? My understanding is cell phones take 12 to 24 months from design to market. so, initial deployment of the model where this OS can trigger the 'fuse' less one year is how far back the company decided to be ready to do this?

show 1 reply
mycalltoday at 10:08 PM

How hard is it to fix a fuse with a microscope and a steady hand?

charcircuittoday at 9:34 PM

This is industry standard. Flashing old updates that are insecure to bypass security is a legitimate attack vector that needs to be defended against. Ideally it would still be possible up recover from such a scenario by flashing the latest update.

pengarutoday at 9:59 PM

Glad I didn't give these people any of my hard earned dollars.

bfleschtoday at 9:20 PM

How likely is it that such software-activated fuse-based kill switches are built into iPhones? Any insights?

show 4 replies
IshKebabtoday at 9:16 PM

Why? What advantage do they get from this? I'm assuming it's not a good one but I'm struggling to see what it is at all.

show 2 replies
hypeateitoday at 9:21 PM

It's my first time hearing about this "eFuse" functionality in Qualcomm CPUs. Are there non-dystopian uses for this as a manufacturer?

show 3 replies
jijjitoday at 9:55 PM

im sure that is not going to improve their sales numbers

mystralinetoday at 9:44 PM

Its high time we start challenging these sorts of actions as the "vandalization and sabotage at scale" that these attacks really are. I dont see how these aren't a direct violation of the CFAA, over millions of customer-owned hardware.

They are no different than some shit ransomware, except there is no demand for money. However, there is a demonstrable proof of degradation and destruction of property in all these choices.

Frankly, criminal AND civil penalties should be levied. Criminally, the C levels and boars of directors should all be in scope as to encouraging/allowing/requiring this behavior. RICO act as well, since this smells like a criminal conspiracy. Let them spend time in prison for mass destruction of property.

Civally, start dissolving assets until the people are made whole with unbroken (and un-destroyed) hardware.

The next shitty silly-con valley company thinks about running this scam of 'customer-bought but forever company owned', will think long and hard about the choices of their network and cloud.

show 1 reply