Oneplus phone update introduces hardware anti-rollback
Perceived shift in OnePlus’ philosophy
- Commenters see this as OnePlus completing a long slide from “flagship killer / modder‑friendly” to ordinary locked‑down OEM, especially since Nord, Oppo integration, and rumours of brand wind‑down.
- Some long‑time users say this is the final straw and plan to freeze updates or abandon OnePlus for Pixels or other alternatives.
What the anti‑rollback fuse actually does
- Qualcomm SoCs include QFPROM eFuses and secure boot chain: ROM → XBL → ABL → AVB → OS.
- New firmware burns an “anti‑rollback” version into fuses; on boot the loader compares the firmware’s embedded version to the fuse value.
- If a lower version is flashed (including older stock firmware or ROM‑bundled firmware), boot is rejected; on these devices that can mean a hard brick, sometimes recoverable only by motherboard replacement or specialized EDL tooling.
- Bootloader unlocking still works; the key change is that all older firmware trees, including those bundled in existing custom ROMs, become unusable on fused devices.
Motivations and security rationale
- Supportive view: a serious low‑level bootloader/EDL vulnerability or theft‑lock bypass existed; without rollback protection, attackers with physical access could flash an old, signed, vulnerable image to extract data or bypass locks.
- Critics argue this is also a convenient way to force stock updates, kill downgrades, and strengthen lock‑in, with anti‑theft and CVEs used as recurring justifications.
Impact on custom ROM community
- Existing ROMs built against pre‑fuse firmware bases can immediately brick updated devices; users are told not to flash anything until ROM maintainers explicitly add support.
- In principle, ROMs can be rebuilt against the new firmware/bootloader and made to work, but downgrading to earlier ROM builds or stock versions will remain impossible.
Security vs. ownership debate
- Large subthread debates whether hardware anti‑rollback and trusted boot are legitimate security tools (anti‑downgrade, anti‑theft, anti‑Pegasus) or fundamentally anti‑ownership.
- Many argue remote, irreversible hardware state changes by vendors undermine right to repair and even basic property rights; others counter that eFuses and rollback prevention are longstanding, industry‑standard practices.
Broader context and comparisons
- eFuses and anti‑rollback are described as ubiquitous across SoCs and used for yield management, unique keys, secure boot, and Knox‑style features.
- Similar downgrade‑blocking exists on iPhones (signature‑based), Samsungs (Knox), consoles, and is encouraged by Android certification; some fear upcoming EU cybersecurity rules will be used to tighten such controls further.