PS C:\esp\Espressif\frameworks\esp-idf-v5.1.2\examples\security\flash_encryption> espefuse.py -p COM5 burn_key secure_boot_v1 C:/esp/Espressif/frameworks/esp-idf-v5.1.2/examples/security/flash_encryption/build/bootloader/secure-bootloader-key-256.bin espefuse.py v4.7.dev3 Connecting.... Detecting chip type... Unsupported detection protocol, switching and trying again... Connecting...... Detecting chip type... ESP32 === Run "burn_key" command === Sensitive data will be hidden (see --show-sensitive-info) Burn keys to blocks: - BLOCK2 -> [?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ??] Reversing the byte order Disabling read to key block Disabling write to key block Burn keys in efuse blocks. The key block will be read and write protected Check all blocks for burn... idx, BLOCK_NAME, Conclusion [00] BLOCK0 is not empty (written ): 0x00000004f0100000000002320000a2000005c4dee2658fb407f00000 (to write): 0x00000000000000000000000000000000000000000000000000020100 (coding scheme = NONE) [02] BLOCK2 is empty, will burn the new value . This is an irreversible operation! Type 'BURN' (all capitals) to continue. BURN BURN BLOCK2 - OK (write block == read block) BURN BLOCK0 - OK (all write block bits are set) Reading updated efuses... Successful PS C:\esp\Espressif\frameworks\esp-idf-v5.1.2\examples\security\flash_encryption>