I don't think that secure boot is possible on the RevPi.
The ATECC508A chip's documentation is available
without NDA:
https://www.microchip.com/mymicrochip/f ... e=en590686
I asked Microchip if the data sheet is accessible by intention; it is. They decided to make it public now that they also sell the ATECC608A.
Note that Kunbus wants you to sign a special contract before you may use the chip.
You could use the chip to store (or decrypt) the hard drive encryption key, or the private key that you use for e.g. TLS connections.
Then the attacker not only needs to create a copy of the eMMC, they also need access to the chip. E.g. by booting a different system through USB.
It makes the attack a bit more complicated, but doesn't prevent it.
The
https://www.microchip.com/wwwproducts/en/ATECC608A offers "Secure boot support". But I doubt that it's really secure. I still need to get my hands on the full datasheet (under NDA).
For secure boot, the CPU needs to support it, and the CPU on the Raspberry Pi doesn't. (Someone correct me if I'm wrong!)
And even if a CPU supports it, there are other ways to break in, e.g. exploit a flaw in the CPU or in software that's running on the device.
If you want to harden your RevPi (against whom?), take physical measures. Lock it into a cabinet, place a fluffy guard dog in front of it.
If your overall security concept depends on the security of a device where random people have physical access to, your concept needs rethinking.
Assume that someone will steal the keys from your device, no matter what hardware you use and no matter what else you try to prevent it.