Home
The Id of IoT Blog
Archive
Contact
Subscribe
New posts weekly.
Email Address
Submit
Thank you!
Security Embedded is 15+ years of experience in building secure systems. Learn more about how we can help you by exploring Phil's blog or contacting us.
Security Embedded
Archive
Crypto Disasters
Mar 18, 2017
Security Specifications for the Layperson
Aug 7, 2016
The Challenges of a Lightweight Secure Channel
Jul 16, 2016
Is Fixing Symmetric Keys The Worst Sin?
Jul 15, 2016
Firmware Updates Gone Wrong: Part 3
Jul 13, 2016
Attacking Crypto Using Stolen Keys
Jul 12, 2016
Plaintext Symmetric Keys, fixed IVs, oh my!
Jul 8, 2016
Firmware Updates Gone Wrong: Part 2
Jul 7, 2016
Firmware Updates Gone Wrong: Part 1
Jul 4, 2016
Crypto is a Munition* for a Reason
Embedded Design Practices
Aug 28, 2016
Securing BLE Links
Aug 21, 2016
When NULL is a Valid Address
Aug 8, 2016
Cryptography Does Not Always Mean Encryption
Jul 24, 2016
Do you need an OS?
Jul 22, 2016
Malloc is an Antipattern
Hardware Security
May 3, 2021
Under the Hood of WebAuthn in Safari
Aug 12, 2018
A Treatise on Voting Machines
Dec 9, 2017
A Pragmatic Look at Trust
Jan 16, 2017
Weaponizing Reverse Engineered Knowledge
Jul 11, 2016
What's in a Firmware Load?
Jul 10, 2016
Attacking Firmware Loads
Jul 8, 2016
What Are You Leaving on the FR4* Table?
Miscellany
Jun 30, 2016
Breaking Bad(ly designed hardware)
Principia Securitas
May 3, 2021
Under the Hood of WebAuthn in Safari
Nov 14, 2020
Application Trust is Hard, but Apple does it Well
Mar 18, 2017
Security Specifications for the Layperson
Aug 28, 2016
Securing BLE Links
Aug 16, 2016
Control the (Command) Conversation
Aug 8, 2016
Cryptography Does Not Always Mean Encryption
Aug 7, 2016
The Challenges of a Lightweight Secure Channel
Jul 30, 2016
There's No Security Without Entropy
Jul 18, 2016
Building a Chain of Trust at Boot
Jul 16, 2016
Is Fixing Symmetric Keys The Worst Sin?
Jul 15, 2016
Firmware Updates Gone Wrong: Part 3
Jul 12, 2016
How Trustworthy is that App with those Capabilities?
Jul 11, 2016
What's in a Firmware Load?
Jul 8, 2016
Firmware Updates Gone Wrong: Part 2
Jul 7, 2016
Firmware Updates Gone Wrong: Part 1
Jul 6, 2016
Write and Execute: Never at the Same Time
Jul 4, 2016
Crypto is a Munition* for a Reason
Jul 2, 2016
Principia Securitas: How to Mitigate Threats
Wireless Security
Jan 16, 2017
Weaponizing Reverse Engineered Knowledge