Hi Flashrom team,
I'm a forensic engineer focused on hardware-level validation and SPI
flash access across locked platforms. I've worked extensively on
probing SPI flash from T2 MacBooks and similar devices, and recently
developed a custom Windows kernel-mode driver for MMIO mapping and SPI
controller access.
As part of this work, I’ve begun creating a signed kernel-mode driver
designed to enable internal SPI flash access on Windows—particularly
for platforms where external programmers aren’t viable or where
forensic traceability is essential. The driver emphasizes modularity,
context preservation, and empirical validation, and I’m exploring how
it could interface with Flashrom’s internal programmer logic.
I understand Flashrom currently relies on external drivers like
WinRing0 or portio.sys for low-level access on Windows, but these
solutions are unsigned, fragile, and often flagged by modern security
tools. I’d like to ask whether the team would be open to discussing
the possibility of integrating or supporting a signed kernel-mode
driver for secure internal access on Windows.
If there’s interest, I’d be happy to share technical details,
constraints, and potential implementation paths. I deeply appreciate
the work you’ve done on Flashrom—it’s an invaluable tool for the
hardware security and research community.
Best regards,  James
_______________________________________________
flashrom mailing list -- flashrom@flashrom.org
To unsubscribe send an email to flashrom-le...@flashrom.org

Reply via email to