In the context of the secure boot flow of the i.MX8QM, I'd like to understand when and how do we make sure that the software is executing on a genuine CPU, i.e. not a counterfeit part that would accept to run anything.
By confidential, do you mean that it could be communicated under specific conditions, or that it's a definite no-no. In the former case, I'd appreciate it if you could let me know how to proceed.