Hi Flashrom team, I'm a forensic engineer focused on hardware-level validation and SPI flash access across locked platforms. I've worked extensively on probing SPI flash from T2 MacBooks and similar devices, and recently developed a custom Windows kernel-mode driver for MMIO mapping and SPI controller access. As part of this work, I’ve begun creating a signed kernel-mode driver designed to enable internal SPI flash access on Windows—particularly for platforms where external programmers aren’t viable or where forensic traceability is essential. The driver emphasizes modularity, context preservation, and empirical validation, and I’m exploring how it could interface with Flashrom’s internal programmer logic. I understand Flashrom currently relies on external drivers like WinRing0 or portio.sys for low-level access on Windows, but these solutions are unsigned, fragile, and often flagged by modern security tools. I’d like to ask whether the team would be open to discussing the possibility of integrating or supporting a signed kernel-mode driver for secure internal access on Windows. If there’s interest, I’d be happy to share technical details, constraints, and potential implementation paths. I deeply appreciate the work you’ve done on Flashrom—it’s an invaluable tool for the hardware security and research community. Best regards, James
_______________________________________________ flashrom mailing list -- flashrom@flashrom.org To unsubscribe send an email to flashrom-le...@flashrom.org