Assume that it is not possible to flash the Mini D with Esphome as it has something to do with it being matter compatiable? A post i read seemed to indicate that but you can flash the Mini R4M so I am uncertain about that reason.
There are two test pads exposed RST and KEY other than the normal 3.3 GND TX RX.
I have tried a bunch different combonations with the KEY pad to get it to flash esphome with no luck.
The matter in Sonoff are usually added over WiFi and the chip used is not a special Matte chip, so it should be possible.
It is probably just a question about getting it in flash mode.
The chip is the ESP32-D0WD R2-V3. And I don’t think that the exposed push button is connected to GPIO0. As stated I’ve tried pulling the KEY pad to ground at different points during boot and i don’t seem able to get it right.
Afaik the matter specification does enforce the lock down of a device to get certified. That probably results some technical measurements like a boot lock and/or efuse to prohibit full ownership.
Which might not be available at all on matter devices
That is it. From a short read matter mandates secure boot/flash and prohibits “unauthorized” (by the manufacture) firmware to be flashed.
That means: No right to repair, no right to modify/change/extend functionalities or even full ownership with matter devices
From sonoff you might get some devices as matter and wifi version - the latter mostly can be owned totally (esp, beken, reltek based devices thx to esphome)
Espressif’s have their zerocode and there is no lock down there and it is certified.
You are probably right that it is locked down when the Matter is flashed to it, but a complete reflash should not be blocked.
I don’t think that this is the case, accordingly CSA:
Espressif provides the most comprehensive solutions for Matter, including support for Wi-Fi or Thread end-point devices, Thread Border Routers, and Matter gateway devices.
You are right.
Zerocode devices are not certified.
I am pretty sure you are correct with the secure boot requirement, but I see nothing that prevents another firmware to be flashed.
Such a flashing would void the Matter certification, but since it would also remove the Matter certified firmware, then the issue is non-existing.
The fact that some devices can flashed to Matter OTA from a nin-Matter firmware means no boot lock can be installed then.
There seems to be no secure boot as such, but there is a private key encoded in certified firmwares that needs to match a public key on the CSA DCL.
My guess is that the Matter server is the part that makes these checks.
Secure Boot protects a device from running any unauthorized (i.e., unsigned) code by checking that each piece of software that is being booted is signed.
Any updated bootloader or app will need to be signed with a key matching the digest already stored in eFuse.
Please note that enabling Secure Boot or flash encryption disables the USB-OTG USB stack in the ROM, disallowing updates via the serial emulation or Device Firmware Update (DFU) on that port.
After Secure Boot is enabled, further read-protection of eFuse keys is not possible. This is done to prevent an attacker from read-protecting the eFuse block that contains the Secure Boot public key digest, which could result in immediate denial of service and potentially enable a fault injection attack to bypass the signature verification. For further information on read-protected keys, see the details below.
There really is! Mostly in combination with flash encryption
The fact that matter allows to brew your own DIY devices (without certification) doesn’t mean you can buy such “unlocked” device as that would violate the matter specification itself
Are you sure, the CSA (they are actually in charge for the matter standard) tell us on their website:
What is product security and how does it differ from protocol security?
Standards such as Zigbee and Matter define requirements for the security of network protocols. The Product Security Working Group supplements these by creating a certification program for the security of products as a whole, including security features such as secure boot that are inherent in the product but not part of a network protocol.
So it is not a direct requirement in the Matter protocol, but it can be in the product security certification, which is an additional certification, that can be used with both Matter and Zigbee and even other products too.
It is a bit vague if it is a product security certification is a requirement Matter and Zigbee certifications, in which way they might be indirect requirements.
Sadly that link means that not even Zigbee devices are safe from such lockdowns and with EU pushing for more and more product security with its laws, then it will soon only be cheap Chinese products that do not care about these laws.
Also you can buy devices already running esphome or tasmota and don’t require inital flashing
Some practical example could could be some wall switches based on esp32 being (solely software wise with two lines of yaml) extened beings a Bluetooth proxy