Skip to content

cryptotronix

  • Home
  • About
  • Videos
  • Training
  • Blog
  • Contact

Author: Josh Datko

I'm the owner of Cryptotronix, an embedded security company. As a submarine officer, I was sent to Afghanistan to ensure that the Tailiban did not develop a submarine force--mission accomplished! Author of BeagleBone for Secret Agents, presenter at HOPE and DEF CON, and Black Hat Trainer.
Featured
December 15, 2021January 6, 2022 by Josh Datko

CWE 1191: On-Chip Debug and Test Interface With Improper Access Control

In this video we discuss CWE 1191: On-Chip Debug and Test Interface With Improper Access Control. Read More

Training, Videos
Featured
December 14, 2021January 6, 2022 by Josh Datko

CWE 1189: Improper Isolation of Shared Resources on a System-on-Chip (SoC)

osh discusses the Most Important Hardware Weaknesses of 2021. In this video he goes over CWE 1189, Improper Isolation of Shared Resources on System-on-a-Chip (SoC). Read More

Videos
Featured
November 11, 2021December 15, 2021 by Josh Datko

Veterans Day 2021

Happy Veteran’s Day y’all. Read More

Announce
Featured
October 7, 2021December 16, 2021 by Josh Datko

Toorcon: San Beagle eCTF

CTF at Toorcon is next week! Check it out at advsec.io/ctf. Read More

Events, Training, Videos
Featured
September 21, 2021December 16, 2021 by Josh Datko

Season 1 Episode 4 of Bytes, Boards, and Books

In this video, I go over my favorite and not-so-favorite RISCV dev boards and RISCV books. Not surprisingly, the best boards IMHO are coming from SiFive right now. Read More

Training, Videos
Featured
September 16, 2021December 16, 2021 by Josh Datko

Josh Will Be Featured on the Microchip Shields Up! Series

SHIELDS UP! Season 2 Episode 2 with Cryptotronix CEO Josh Datko is scheduled on September 22nd at 8:00 a.m. PDT. He will share how his consulting firm starts with a threat model discussion and how they help strengthen trust on non-TLS networks. https://mchp.us/3BGDbHY Read More

Announce, Events 1 Comment
Featured
September 3, 2021December 16, 2021 by Josh Datko

Security Logging and Monitoring in the IoT

Insufficient logging and monitoring have been on the OWASP Top 10 for some time now, but is this applicable to IoT deployments as well as web apps? Read More

Training, Videos 1 Comment
Featured
August 20, 2021December 16, 2021 by Josh Datko

Sniffing TPM Buses: All the Kids Are Doing it Now

A few weeks ago there was a blog post about sniffing the SPI bus that had a TPM to decrypt a bit locker-encrypted laptop. Reactions ranged the typical response on the classic watering holes. Read More

Videos 1 Comment
Featured
July 29, 2021December 16, 2021 by Josh Datko

Advanced Security Intro to Hardware Hacking and Reverse Engineering Preview

In this video Josh gives a small taste of what you can expect in the Introduction to Hardware Hacking and Reverse Engineer Course at Advanced Security. Specifically, he shows the run-time interpreter used to directly PEEK and POKE memory address. Read More

Events, Training, Videos
Featured
July 22, 2021December 16, 2021 by Josh Datko

What is PKCS#11, why does it suck, and why will you keep using it?

In this video, Josh discusses about the PKCS#11 standard. Read More

Videos 1 Comment

Posts navigation

← Older posts
Newer posts →

Recent Posts

  • fs-verity: Embedded Linux File Protection
  • Announcing the Cryptotronix Podcast
  • The UK Product Security and Telecommunications Infrastructure (PSTI) Bill
  • Mistakes in Custom Embedded Protocols
  • Infosec’s Midlife Crisis
  • Cybersecurity gets no respect!
  • CWE 1277: Firmware Not Updatable
  • CWE 1272: Sensitive SRAM
  • CWE 1240: Risky Crypto
  • CWE 1231: Improper Prevention of Lock Bit Modification
  • CWE 1191: On-Chip Debug and Test Interface With Improper Access Control

Enter your email to subscribe to new posts.

 

Loading Comments...