A few weeks ago there was a blog post about sniffing the SPI bus that had a TPM to decrypt a bit locker-encrypted laptop. Reactions ranged the typical response on the classic watering holes. Read More
A few weeks ago there was a blog post about sniffing the SPI bus that had a TPM to decrypt a bit locker-encrypted laptop. Reactions ranged the typical response on the classic watering holes. Read More
In this video Josh gives a small taste of what you can expect in the Introduction to Hardware Hacking and Reverse Engineer Course at Advanced Security. Specifically, he shows the run-time interpreter used to directly PEEK and POKE memory address. Read More
In this video, Josh discusses about the PKCS#11 standard. Read More
In this video, I confuse “Big Time” with “Sledgehammer.” Those music videos are still pretty epic. Then, I go into a bit of a rant of why cryptocurrency hardware, mainly for wallets, is different than normal cryptographic hardware. Read More
On Aug. 26/27, I’ll be giving a RISCV Security Class! We’ll look through the hype of RISCV and look at the security model. Read More
Happy Memorial Day from Cryptotronix with some Navy submarine stories. Read More
Episode 2! I show the tools around my favorite chip, the Xilinx Zynq 7000, and then we get into some military-industrial themed books! Read More
Thanks Jason Jaques for the honor to be on the Colorado = Security podcast this week! I’m impressed with how this community has grown — it’s a great resource for anyone in or wanting to be in infosec in Colorado. Read More
In this monthly show, Josh talks about computer security (bytes), development kits and hardware (boards), and books! Read More
What is this Trusted Execution Environment? What problems does it solve? What problems does it introduce? Why am I asking so many questions?! Read More
