Flash Forward is a show about possible (and not so possible) future scenarios. What would the warranty on a sex robot look like? How would diplomacy work if we couldn’t lie? Could there ever be a fecal transplant black market? (Complicated, it wouldn’t, and yes, respectively, in case you’re curious.) Hosted and produced by award winning science journalist Rose Eveleth, each episode combines audio drama and journalism to go deep on potential tomorrows, and uncovers what those futures might re ...
…
continue reading
Content provided by Dave Jones & Chris Gammell, Dave Jones, and Chris Gammell. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Dave Jones & Chris Gammell, Dave Jones, and Chris Gammell or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!
Go offline with the Player FM app!
#698 – Hardware Security with Matt Brown
MP3•Episode home
Manage episode 494990097 series 1244155
Content provided by Dave Jones & Chris Gammell, Dave Jones, and Chris Gammell. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Dave Jones & Chris Gammell, Dave Jones, and Chris Gammell or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Welcome Matt Brown of Brown Fine Security!
- Matt has been reverse engineering a “smart” smoker controller that talks back to AWS IOT
- Jeff Geerling talking about his dishwasher
- Storing private keys on the device??
- Threat models
- Key rotation
- What is the best case scenario for an IoT device?
- Secure boot / trust zone
- Keys encrypt flash storage
- Chris has designed in the ATECC608 before
- Replacing Certificate Authority (CA) cert in grill firmware
- Matt has a Linux hardware / reverse engineering background
- Flash is always external
- Ghidra / idapro / binwalk
- Security cameras are 99% linux based (battery based cameras might be embedded)
- Best practices
- Encrypted firmware
- hidden uart / jtag
- Keys
- Are linux devices “worth more” to a security researcher?
- CVSS risk scoring system
- Attack vector
- Vulnerabilities are better if it can be a remote executed
- Linux devices have more compute
- Bluetoothe LE
- Ability to enumerate
- Scale reverse engineering
- Chris has discussed the silliness of a bluetooth toothbrush on the show before
- Tools / Software of the trade
- xgeku firmware reader
- picoemp
- PCBite
- Saleae
- SDR USRP B200
- Universal radio hacker
- Stick-to-it-ness
- Matt just came back from hardwear.io, one of his new favorite conferences
- Find Matt at the embedded systems village at DEF CON
- Follow Matt via his YouTube channel
- Matt has a new IoT Security newsletter starting up
78 episodes
MP3•Episode home
Manage episode 494990097 series 1244155
Content provided by Dave Jones & Chris Gammell, Dave Jones, and Chris Gammell. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Dave Jones & Chris Gammell, Dave Jones, and Chris Gammell or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Welcome Matt Brown of Brown Fine Security!
- Matt has been reverse engineering a “smart” smoker controller that talks back to AWS IOT
- Jeff Geerling talking about his dishwasher
- Storing private keys on the device??
- Threat models
- Key rotation
- What is the best case scenario for an IoT device?
- Secure boot / trust zone
- Keys encrypt flash storage
- Chris has designed in the ATECC608 before
- Replacing Certificate Authority (CA) cert in grill firmware
- Matt has a Linux hardware / reverse engineering background
- Flash is always external
- Ghidra / idapro / binwalk
- Security cameras are 99% linux based (battery based cameras might be embedded)
- Best practices
- Encrypted firmware
- hidden uart / jtag
- Keys
- Are linux devices “worth more” to a security researcher?
- CVSS risk scoring system
- Attack vector
- Vulnerabilities are better if it can be a remote executed
- Linux devices have more compute
- Bluetoothe LE
- Ability to enumerate
- Scale reverse engineering
- Chris has discussed the silliness of a bluetooth toothbrush on the show before
- Tools / Software of the trade
- xgeku firmware reader
- picoemp
- PCBite
- Saleae
- SDR USRP B200
- Universal radio hacker
- Stick-to-it-ness
- Matt just came back from hardwear.io, one of his new favorite conferences
- Find Matt at the embedded systems village at DEF CON
- Follow Matt via his YouTube channel
- Matt has a new IoT Security newsletter starting up
78 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.