# HAB vs AHAB — Secure Boot Evolution on NXP i.MX Platforms
Yocto Secure Boot 3 / 3
6 min read
In the previous article, we examined how trust transitions across a generic embedded boot chain:
In the previous article, we examined how trust transitions across a generic embedded boot chain:
In the previous article, we introduced Secure Boot as a trust architecture built on:
Secure Boot is often introduced as a simple concept:
After controlling the build environment and locking all build inputs, the final step is to verify that builds are actually reproducible.
After establishing a controlled and reproducible build environment, the next step is to ensure that all inputs to the build process are deterministic. In Yocto, this means explicitly controlling what…
A brief introduction about how to start building reproducible yocto images.