Forum Discussion

Rameriz's avatar
Rameriz
Icon for New Contributor rankNew Contributor
3 years ago

USB Blaster II Letter of Volatility Requested

I am looking for the Letter of Volatility for the Altera USB-Blaster II. I was previously provided under case #05156156 to another member. Can you please e-mail it to me. Thanks

9 Replies

    • Rameriz's avatar
      Rameriz
      Icon for New Contributor rankNew Contributor

      Hi, I received the letter but ask for an update. The letter's subject is "Intel FPGA USB Download Cable (formerly the USB Blaster)", and in the body it refers to "[PL-USB-BLASTER-RCN]".

      The issue is that part I have in hand states "Altera USB-Blaster II". There is no reference to Intel or the part number you referred to. So my ask is can you update the letter to include "Altera USB-Blaster II" either in the Subject line or in the body.

      ps. picture of product attached for reference

      Thanks

      RR

    • Rameriz's avatar
      Rameriz
      Icon for New Contributor rankNew Contributor

      Sorry, I do not quite understand the response. Will you be providing an updated letter?

    • ndlovaglio's avatar
      ndlovaglio
      Icon for New Contributor rankNew Contributor

      Can you send me a cop of this CoV/LoV for the PL-USB-BLASTER-RCN?

      Thank you.

      • Rameriz's avatar
        Rameriz
        Icon for New Contributor rankNew Contributor

        This is what I received from Intel. Hopefully one of them will work for you.

  • Nate5's avatar
    Nate5
    Icon for New Contributor rankNew Contributor

    Hello Intel,

    Thank you for providing the LoV. My security team has a question for you. In the LoV for the Altera USB-Blaster II, It says "The firmware does support programming the non-volatile firmware storage memory as well as the non-volatile UFM. These features are only internally available but the functionality is there."

    By "only internally available", does that mean only Intel personnel can program the non-volatile firmware (through the use of proprietary software, etc.)?

    We need to make sure that anyone in general cannot edit the non-volatile memory. If we can, is there a procedure to sanitize it?