2010-05-25 12:12 AM
How to disable USART bootloader?
2011-05-17 04:52 AM
If you use a BGA, you can tie the pins (BOOT0, BOOT1) to internal layers. Normal users won't have access to internal bootloader anymore.
But I think the internal bootloader is more secure than an open JTAG interface ;) The second question is discussed in other threads. The normal way from JTAG or internal bootloader: You have to disable read protection first (before you are able to disbable the write protection). Disabling read protection starts a mass erase. After the erase has been completed, the option bytes will be erased. Then you need a reset to use the new option bytes. But I think that there is a second way (backdoor).2011-05-17 04:52 AM
Have to agree with damh here, the USART bootloader is fairly secure, and certainly more so than JTAG, where you'd be able to sniff RAM content. It is also much easier to use in a production environment.
Most of your security issues will be with field updates. Anyone with any real talent/equipment will be able steal your code, even if they have to destroy the device to get at it.