How internal flash of STMU575/585 can be protected from copying during firmware update at manufacturer/customer side?
We deliver encrypted image to the customer-manufacturer. After image update is performed the image is stored opened in internal flash. With RDP level set to 2 it is possible protect from jtag debugging and access. But if hacker at manufacturer side, writes it's own application (both desktop and ST part, residing in SRAM, or even one of internal flash banks) to read internal flash, what kind of physical protection on ST MCU side can be applied at this stage?
Assume experienced hacker can write it's own "CubeProgrammer tool", which would read internal flash. How flash can be protected from that?
