Open source is not a cure-all
A Chaos Communication Congress speaker reflects on whether using open-source hardware can solve trust problems in hardware.
5 articles
A Chaos Communication Congress speaker reflects on whether using open-source hardware can solve trust problems in hardware.
Trojanized HID devices as well as surveilling or malicious cables are serious threats that can be used to compromise even air-gapped systems.
Meltdown and Spectre: the two vulnerabilities that threaten every device on Intel, AMD or ARM processors
A virus that discreetly infests hardware may be the user’s worst nightmare. Hardware attacks are much scarier than attacks on the operating system because ordinary antivirus scans don’t examine systems
In fact, it’s the one of the most widely believed myths in the infosec world. At the same time, it’s the most non-standard one. That double-sided nature is likely the