Hi Kobi,
you said:
"For development - we provide the dummy "playground" cert store that will enable you to use our proprietary certificate chain. For production - it must be a valid certificate." in https://e2e.ti.com/support/wireless-connectivity/wifi/f/968/t/582674?CC3220SF-LAUNCHXL-CC3220-Secure-Bootloader-Filesystem
But i have done my own research. I think it is a advice from ti that vendor shouldn't use playground certificate for signing images in production because everybody with access to playground certificates can sign a image which will then be accepted from the bootload or the host mcu. I have tried production mode flashing via spi and with playground certificates it worked in production mode.
But a own certificate one trusted by a well known ca or a complete self certificated chain is only needed if i want to surpress installing and running other images which aren't from me. But what is happening to encryption e.g. secure files i think they won't be affected if somebody is using playground certificates because encryption will be done by the unique id in nwp which isn't public. Are me thoughts correct ?
BR,
Arnaud