Open source is not a cure-all
A Chaos Communication Congress speaker reflects on whether using open-source hardware can solve trust problems in hardware.
5 articles
A Chaos Communication Congress speaker reflects on whether using open-source hardware can solve trust problems in hardware.
Trojanized HID devices as well as surveilling or malicious cables are serious threats that can be used to compromise even air-gapped systems.
Meltdown and Spectre: the two vulnerabilities that threaten every device on Intel, AMD or ARM processors
Any USB device can potentially be zombified and turned into a secret agent for cybercrooks. The world needed a shield against this threat, so we rolled up our sleeves and created one.
A virus damaging hardware is one of the most widely believed myths in the infosec domain. And, at the same time, it’s the most non-standard one. And it’s not totally a myth, after all.