
What security options do we have for battery-powered MCUs? Read More
What security options do we have for battery-powered MCUs? Read More
In this video I quickly try to break down mutual TLS and device specific credentials. Read More
What does an IoT system security architecture look like? Find out in this short video. Read More
What is Secure Boot? View this short training video to find out.
Read More
We are excited to announce that we recently became an official CryptoAuthentication Design Partner Specialist with Microchip Technology. As a Design Partner Specialist we are part of a team of companies developing key expertise using the Microchip security devices and libraries. We’ve been designing and using these parts since 2014 when we released with SparkFun… Read More
Josh is now providing training services with Advanced Security Training, which offers the best online format for live video streaming InfoSec training. He recently completed a 2-day class focusing on building secure designs for the Xilinx Zynq 7000. The exercises started with integrating XADC and concluded with a Buildroot based embedded Linux bringup with a… Read More
This week I was on the Amp Hour podcast! If you like embedded security, crazy stories about life on a submarine, want to hear a teaser on our upcoming CCC talk, or how to make blockchain beef, you should find something in here for you! 😉
Cryptotronix just celebrated its five year anniversary! This all started with the humble hashlet and now we have four employees covering embedded hardware (circuit design/PCB layout/RTL), firmware (MCU/Linux drivers/App development) and of course, security (audit/design/architecture/development).
I’m happy to announce that I’ll be speaking with two amazing colleagues, Dmitry Nedospasov and Thomas Roth, at the 35th Chaos Communication Congress next month in Leipzig, Germany. Our talk, wallet.fail covers the following: In this presentation we will take a look at how to break the most popular cryptocurrency hardware wallets. We will uncover… Read More
See you at the Hardware Attacks, Threats, Risks, and Mitigations class at Black Hat 2018! Read More