docs: Update pre_encrypted_ota example README

Update pre_encrytped_ota example README to clarify the difference
between Flash Encryption and Pre-encrypted OTA
This commit is contained in:
Harshit Malpani 2024-04-22 12:02:24 +05:30 committed by Mahavir Jain
parent 73190dd04e
commit b7a8e6102f
No known key found for this signature in database
GPG Key ID: 99324EF4A00734E0

View File

@ -9,6 +9,8 @@ Pre-encrypted firmware binary must be hosted on OTA update server.
This firmware will be fetched and then decrypted on device before being flashed.
This allows firmware to remain `confidential` on the OTA update channel irrespective of underlying transport (e.g., non-TLS).
* **NOTE:** Pre-encrypted OTA is a completely different scheme from Flash Encryption. Pre-encrypted OTA helps in ensuring the confidentiality of the firmware on the network channel, whereas Flash Encryption is intended for encrypting the contents of the ESP32's off-chip flash memory.
> [!CAUTION]
> Using the Pre-encrypted Binary OTA provides confidentiality of the firmware, but it does not ensure authenticity of the firmware. For ensuring that the firmware is coming from trusted source, please consider enabling secure boot feature along with the Pre-encrypted binary OTA. Please refer to security guide in the ESP-IDF docs for more details.