The
source code is compiled and burned to the device; source code is not involved
during the use of the device. The debug interface has been closed, and
unauthorized users cannot access it.
JIMI
developers use Git to control source code of the device, and it implement session
control, access control, all these functions can protect device code from unauthorized
access and tampering.