A thought occurred to me:
Once my product is out in the field (with .netmf) what would it take to extract the program from the micro controller. It is possible to run a program from another bootable media (e.g. SD card) which then reads the flash data sections of my device and stored it back on that same SD card?
Is that possible? Can an attacker extract my .netmf program by “convinving” the uC to boot from another media (e.g. SD card)?