Skip to content

cryptotronix

  • Home
  • Home
  • About
  • About
  • Training
  • Blog
  • Contact
  • Blog
  • Contact

Author: Josh Datko

I'm the owner of Cryptotronix, an embedded security company. As a submarine officer, I was sent to Afghanistan to ensure that the Tailiban did not develop a submarine force--mission accomplished! Author of BeagleBone for Secret Agents, presenter at HOPE and DEF CON, and Black Hat Trainer.
February 2, 2024 by Josh Datko

How I would add security in undergraduate engineering

I attended the Community Connections Night for the Electrical and Computer Engineering department last night. The students set up maybe 10 different stands to pitch their projects and highlight some of their student organizations. I’ve been volunteering with this group for almost 10 years now. In these 10 years, I’ve only seen maybe 1 or… Read More

Uncategorized college, engineering, security
January 17, 2024 by Josh Datko

How to improve your hardware security in 2024

New year, new vulnerabilities Reading the latest vulnerability report of the ESP32-C3 and C6, quite a popular chip these days, made me think about how to respond to such news. If you are an OEM, it might be “glad I don’t use the ESP32” or if you do it’s “OMG, what happened.” But really, neither… Read More

Uncategorized cryptography, hardware, security
November 7, 2023November 7, 2023 by Josh Datko

BeagleV-Fire is FIIIIIIRE

There’s a new Beagleboard breed – the BeagleV-Fire! It combines Microchip’s Polarfire SoC with the Altoids-tin form factor famous from Beagleboard.org. I am particularly excited about this collaboration for all the reasons I get into in the video. The board is slowing making its way to US distributors right now, which is good because Beagleboard… Read More

Videos beaglebone, polarfire
July 24, 2023 by Josh Datko

Free the CPU! An introduction on how hackers liberate computers!

I gave a talk for the High Plains IEEE Chapter last week. The requested topic was an introduction to computer security. So I gave it go. The original abstract I came up with was a bit boring, so I asked chatgpt to re-write it in a kind of activist tone. There was no burning of… Read More

Events, Videos hacking, security
April 18, 2023April 18, 2023 by Josh Datko

ascon: Light as a feather

NIST announced in February the winner of the lightweight cipher competition. In this video I motivate WHY we even need lightweight ciphers in the first place using my favorite watch!

Videos cryptography
Featured
July 13, 2022April 18, 2023 by Josh Datko

How to handle time on embedded systems?

How to securely handle time on embedded systems? Do you trust your time or not? What should you do if the certificate expires? Where do you sync your time from? Read More

Videos
Featured
June 23, 2022April 18, 2023 by Josh Datko

What is the Device Identifier Composition Engine (DICE)?

In this episode, I introduce the DICE (Device Identifier Composition Engine). I mentioned the motivation for the Trusted Computing Group (TCG) to make this standard and why its specifically tailored for embedded devices like MCUs and smaller controllers. Read More

Training, Videos 1 Comment
Featured
June 14, 2022June 23, 2022 by Josh Datko

Microchip SAMA7G54 EVK and ATECC608 & Spearf1sh and the SAMA7G54 EVK

In this episode I talk about the ATECC608 that’s on the SAMA7G Eval Kit and why, even though the SAMA7 includes TrustZone, you would want an external IC. Read More

Training, Videos 1 Comment
Featured
May 4, 2022 by Josh Datko

fs-verity: Embedded Linux File Protection

Embedded Linux devices are generally lacking in security, but especially file system security. While I’m seeing the ship start to turn with respect to secure boot, there is still a wide lack of file system prevention and monitoring security. Read More

Training, Videos 1 Comment
Featured
April 21, 2022April 21, 2022 by Josh Datko

Announcing the Cryptotronix Podcast

Announcing the Cryptotronix Podcast! Read More

Announce 1 Comment

Posts navigation

← Older posts

Enter your email address to follow this blog and receive notifications of new posts by email.

Recent Posts

  • How I would add security in undergraduate engineering
  • How to improve your hardware security in 2024
  • BeagleV-Fire is FIIIIIIRE
  • Free the CPU! An introduction on how hackers liberate computers!
  • ascon: Light as a feather

Archives

  • February 2024
  • January 2024
  • November 2023
  • July 2023
  • April 2023
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • September 2020
  • April 2020
  • December 2018
  • November 2018
  • March 2018
  • January 2018
  • November 2017
  • October 2017
  • November 2016
  • October 2016
  • September 2016
  • September 2015
  • March 2015
  • December 2014
  • August 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013

Categories

  • 35c3
  • Announce
  • Events
  • Press Release
  • Products
  • Training
  • Uncategorized
  • Videos
Website Built with WordPress.com. Automattic.
cryptotronix
Website Built with WordPress.com.
  • Subscribe Subscribed
    • cryptotronix
    • Join 76 other subscribers
    • Already have a WordPress.com account? Log in now.
    • cryptotronix
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...