Of Boot Vectors and Double Glitches: Bypassing RP2350's Secure Boot

Hackers pop the Pi’s locks—teachers worry, tinkerers cheer

TLDR: Hackers showed they can bypass secure boot on Raspberry Pi’s RP2350, and Raspberry Pi is shipping fixes. Comments debated classroom vs pro features, with praise for transparency and worry about students bricking boards—hinting a shift toward commercial use.

Raspberry Pi dared the internet to break its new RP2350 microcontroller—and the internet said “hold my soldering iron.” In a public challenge, researchers found five ways to bypass the chip’s “secure boot,” the safety check that should block untrusted code. Highlights from the talk: fault injection (electrical chaos) to jump past verification, a double glitch to peek at one-time secrets, and even laser pokes to nudge the boot process. Raspberry Pi’s response? Own it, fix it, and ship a revised chip—leaning hard into “security through transparency.”

The comments lit up with a classroom vs commerce battle. michaelt side-eyed the whole “can’t reprogram” fuse idea, asking if Raspberry Pi is pivoting from school desks to factory floors. Teachers fretted about students accidentally bricking boards; hardware nerds cheered that real-world security belongs in beginner kits; and cynics joked “double glitch, double espresso” while posting “Secure Boot: optional” memes. Some praised Raspberry Pi for inviting hackers in, paying bounties, and publishing the bruises; others warned about lockdown creeping into hobby gear. Verdict from the crowd: awesome transparency, spicy future—because the RP2350 now has both glitch detectors and a community determined to glitch harder.

Key Points

  • Raspberry Pi’s RP2350 MCU launched in August 2024 with active fault-injection defenses.
  • A public RP2350 Hacking Challenge concluded in January 2025 with five successful secure-boot attacks.
  • The talk details two breaks: forcing an unverified vector boot via fault injection, and a double-glitch enabling OTP secret readout.
  • Additional attack methods include laser fault-injection and a reset glitch affecting the boot process.
  • Mitigations were implemented in a new chip revision, with Raspberry Pi collaborating openly with researchers.

Hottest takes

"Seems a bit of a strange feature to even want on a product targeting the education market" — michaelt
Made with <3 by @siedrix and @shesho from CDMX. Powered by Forge&Hive.