POPULARITY
In this episode of the Crazy Wisdom Podcast, host Stewart Alsop sits down with Mike Bakon to explore the fascinating intersection of hardware hacking, blockchain technology, and decentralized systems. Their conversation spans from Mike's childhood fascination with taking apart electronics in 1980s Poland to his current work with ESP32 microcontrollers, LoRa mesh networks, and Cardano blockchain development. They discuss the technical differences between UTXO and account-based blockchains, the challenges of true decentralization versus hybrid systems, and how AI tools are changing the development landscape. Mike shares his vision for incentivizing mesh networks through blockchain technology and explains why he believes mass adoption of decentralized systems will come through abstraction rather than technical education. The discussion also touches on the potential for creating new internet infrastructure using ad hoc mesh networks and the importance of maintaining truly decentralized, permissionless systems in an increasingly surveilled world. You can find Mike in Twitter as @anothervariable.Check out this GPT we trained on the conversationTimestamps00:00 Introduction to Hardware and Early Experiences02:59 The Evolution of AI in Hardware Development05:56 Decentralization and Blockchain Technology09:02 Understanding UTXO vs Account-Based Blockchains11:59 Smart Contracts and Their Functionality14:58 The Importance of Decentralization in Blockchain17:59 The Process of Data Verification in Blockchain20:48 The Future of Blockchain and Its Applications34:38 Decentralization and Trustless Systems37:42 Mainstream Adoption of Blockchain39:58 The Role of Currency in Blockchain43:27 Interoperability vs Bridging in Blockchain47:27 Exploring Mesh Networks and LoRa Technology01:00:25 The Future of AI and DecentralizationKey Insights1. Hardware curiosity drives innovation from childhood - Mike's journey into hardware began as a child in 1980s Poland, where he would disassemble toys like battery-powered cars to understand how they worked. This natural curiosity about taking things apart and understanding their inner workings laid the foundation for his later expertise in microcontrollers like the ESP32 and his deep understanding of both hardware and software integration.2. AI as a research companion, not a replacement for coding - Mike uses AI and LLMs primarily as research tools and coding companions rather than letting them write entire applications. He finds them invaluable for getting quick answers to coding problems, analyzing Git repositories, and avoiding the need to search through Stack Overflow, but maintains anxiety when AI writes whole functions, preferring to understand and write his own code.3. Blockchain decentralization requires trustless consensus verification - The fundamental difference between blockchain databases and traditional databases lies in the consensus process that data must go through before being recorded. Unlike centralized systems where one entity controls data validation, blockchains require hundreds of nodes to verify each block through trustless consensus mechanisms, ensuring data integrity without relying on any single authority.4. UTXO vs account-based blockchains have fundamentally different architectures - Cardano uses an extended UTXO model (like Bitcoin but with smart contracts) where transactions consume existing UTXOs and create new ones, keeping the ledger lean. Ethereum uses account-based ledgers that store persistent state, leading to much larger data requirements over time and making it increasingly difficult for individuals to sync and maintain full nodes independently.5. True interoperability differs fundamentally from bridging - Real blockchain interoperability means being able to send assets directly between different blockchains (like sending ADA to a Bitcoin wallet) without intermediaries. This is possible between UTXO-based chains like Cardano and Bitcoin. Bridges, in contrast, require centralized entities to listen for transactions on one chain and trigger corresponding actions on another, introducing centralization risks.6. Mesh networks need economic incentives for sustainable infrastructure - While technologies like LoRa and Meshtastic enable impressive decentralized communication networks, the challenge lies in incentivizing people to maintain the hardware infrastructure. Mike sees potential in combining blockchain-based rewards (like earning ADA for running mesh network nodes) with existing decentralized communication protocols to create self-sustaining networks.7. Mass adoption comes through abstraction, not education - Rather than trying to educate everyone about blockchain technology, mass adoption will happen when developers can build applications on decentralized infrastructure that users interact with seamlessly, without needing to understand the underlying blockchain mechanics. Users should be able to benefit from decentralization through well-designed interfaces that abstract away the complexity of wallets, addresses, and consensus mechanisms.
Scott and Wes chat with YouTuber and security consultant Matt Brown about breaking into IoT devices, extracting firmware, and decoding the hidden tech inside everyday gadgets. Matt shares his methods, the legal boundaries, and the wild stories behind his most interesting hacks. Show Notes 00:00 Welcome to Syntax! 01:21 Curiosity in Hacking 03:28 Understanding IoT Devices 07:15 Brought to you by Sentry.io. 07:40 Linux vs Microcontrollers 10:11 UART Console Access 13:56 Firmware Extraction Techniques 14:19 Guessing Usernames and Passwords 19:22 Extracting Password Hashes 23:15 Legal Considerations in Hacking 30:06 Where does the inspiration come from? 31:20 Using Logic Analyzers 37:45 CAN Protocol in Automotive 45:42 Influence of Lewis Rossman 54:05 Sick Picks & Shameless Plugs Sick Picks Matt: Key Person of Influence Shameless Plugs Matt:Matt Brown on YouTube, Brown Fine Security Hit us up on Socials! Syntax: X Instagram Tiktok LinkedIn Threads Wes: X Instagram Tiktok LinkedIn Threads Scott: X Instagram Tiktok LinkedIn Threads Randy: X Instagram YouTube Threads
Podcast: The Industrial Security Podcast (LS 35 · TOP 3% what is this?)Episode: Hardware Hacking - Essential OT Attack Knowledge [the industrial security podcast]Pub date: 2025-10-06Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIf you can touch it, you can hack it, usually. And having hacked it, you can often more easily find exploitable vulnerabilities. Marcel Rick-Cen of Foxgrid walks us through the basics of hacking industrial hardware and software systems.The podcast and artwork embedded on this page are from PI Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
If you can touch it, you can hack it, usually. And having hacked it, you can often more easily find exploitable vulnerabilities. Marcel Rick-Cen of Foxgrid walks us through the basics of hacking industrial hardware and software systems.
Podcast: IoT Security Podcast (LS 25 · TOP 10% what is this?)Episode: Breaking Down Barriers: Making IoT and Hardware Hacking Accessible to All with Andrew BelliniPub date: 2025-07-29Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationThe episode centers on the challenges and opportunities in IoT and OT security, with insights from technical content creator, hardware hacker, and educator Andrew Bellini. It highlights the often-overlooked vulnerabilities of industrial and consumer IoT devices, emphasizing the accessibility of hardware hacking and the need for practical, low-cost educational resources, covering hands-on learning, industry anecdotes, recommendations for securing environments, and advice for newcomers interested in hardware security. Let's connect about IoT Security!Follow Phillip Wylie at https://www.linkedin.com/in/phillipwyliehttps://youtube.com/@phillipwylieThe IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcastThe podcast and artwork embedded on this page are from Phosphorus Cybersecurity, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
The episode centers on the challenges and opportunities in IoT and OT security, with insights from technical content creator, hardware hacker, and educator Andrew Bellini. It highlights the often-overlooked vulnerabilities of industrial and consumer IoT devices, emphasizing the accessibility of hardware hacking and the need for practical, low-cost educational resources, covering hands-on learning, industry anecdotes, recommendations for securing environments, and advice for newcomers interested in hardware security. Let's connect about IoT Security!Follow Phillip Wylie at https://www.linkedin.com/in/phillipwyliehttps://youtube.com/@phillipwylieThe IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast
¿Cómo se podría hackear la red eléctrica española? ¿Qué es una red OT? ¿Qué herramientas existen para auditar sistemas industriales? Para contestar a estas y más preguntas, nos acompaña Gabriel Gonzalez, Director de Hardware Hacking en IOActive. https://www.linkedin.com/in/gabrielgonzalezgarcia/ Notas y referencias en https://www.tierradehackers.com/episodio-137 Puedes apoyar este Podcast en Patreon y obtener beneficios exclusivos. Además, estarás ayudando a que siga publicándose muchos años más. https://www.tierradehackers.com/patreon/ ⭐️ SPONSORS ⭐️ ️♂️ Flare Flare es una plataforma de inteligencia de amenazas y monitoreo de la Dark Web que te ayuda a estar un paso por delante de los ciber-delincuentes. Puedes solicitar una prueba gratuita como oyente de Tierra de Hackers aquí: https://try.flare.io/martin-vigo/ ️ YouTube: https://www.youtube.com/tierradehackers Twitch: https://www.twitch.tv/tierradehackers ➡️ Twitter: https://www.twitter.com/tierradehackers ➡️ LinkedIn: https://www.linkedin.com/company/tierradehackers ➡️ Instagram: https://www.instagram.com/tierradehackers ➡️ Facebook: https://www.facebook.com/tierradehackers ➡️ TikTok: https://www.tiktok.com/@tierradehackers No olvides unirte a nuestra comunidad de Discord: https://www.tierradehackers.com/discord
This week in the security news: Citrixbleed 2 and so many failures Ruckus leads the way on how not to handle vulnerabilities When you have no egress Applocker bypass So you bought earbuds from TikTok More gadgets and the crazy radio Cheap drones and android apps Best Mario Kart controller ever VSCode: You're forked Bluetooth earbuds and vulnerabilities Do you remember Sound blaster cards? NFC passport chips Whack-a-disk Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-882
This week in the security news: Citrixbleed 2 and so many failures Ruckus leads the way on how not to handle vulnerabilities When you have no egress Applocker bypass So you bought earbuds from TikTok More gadgets and the crazy radio Cheap drones and android apps Best Mario Kart controller ever VSCode: You're forked Bluetooth earbuds and vulnerabilities Do you remember Sound blaster cards? NFC passport chips Whack-a-disk Show Notes: https://securityweekly.com/psw-882
This week in the security news: Citrixbleed 2 and so many failures Ruckus leads the way on how not to handle vulnerabilities When you have no egress Applocker bypass So you bought earbuds from TikTok More gadgets and the crazy radio Cheap drones and android apps Best Mario Kart controller ever VSCode: You're forked Bluetooth earbuds and vulnerabilities Do you remember Sound blaster cards? NFC passport chips Whack-a-disk Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-882
This week in the security news: Citrixbleed 2 and so many failures Ruckus leads the way on how not to handle vulnerabilities When you have no egress Applocker bypass So you bought earbuds from TikTok More gadgets and the crazy radio Cheap drones and android apps Best Mario Kart controller ever VSCode: You're forked Bluetooth earbuds and vulnerabilities Do you remember Sound blaster cards? NFC passport chips Whack-a-disk Show Notes: https://securityweekly.com/psw-882
Podcast: IoT Security Podcast (LS 24 · TOP 10% what is this?)Episode: Breaking In to Break Things: Practical Paths to Hardware Hacking and IoT SecurityPub date: 2025-06-10Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationHash Salehi, Reserve Engineer and Founder of RECESSIM, joins host Philip Wylie to demystify the world of hardware hacking and security, highlighting niche but critical vulnerability research in IoT and embedded devices. Through recounting his own experiences, from customizing low-cost fault injection attacks on automotive microprocessors to reverse engineering smart meters, Hash shares both successes and frustrations from the front lines of hands-on security assessment. The conversation aims to inspire and equip listeners who want to explore or deepen their understanding of hardware security by surfacing resources, communities, and the mindset necessary to uncover vulnerabilities beyond software.Links:http://www.recessim.com/https://wiki.recessim.com/https://www.youtube.com/c/RECESSIM Let's connect about IoT Security!Follow Phillip Wylie at https://www.linkedin.com/in/phillipwyliehttps://youtube.com/@phillipwylieThe IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcastThe podcast and artwork embedded on this page are from Phosphorus Cybersecurity, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Hash Salehi, Reserve Engineer and Founder of RECESSIM, joins host Philip Wylie to demystify the world of hardware hacking and security, highlighting niche but critical vulnerability research in IoT and embedded devices. Through recounting his own experiences, from customizing low-cost fault injection attacks on automotive microprocessors to reverse engineering smart meters, Hash shares both successes and frustrations from the front lines of hands-on security assessment. The conversation aims to inspire and equip listeners who want to explore or deepen their understanding of hardware security by surfacing resources, communities, and the mindset necessary to uncover vulnerabilities beyond software.Links:http://www.recessim.com/https://wiki.recessim.com/https://www.youtube.com/c/RECESSIM Let's connect about IoT Security!Follow Phillip Wylie at https://www.linkedin.com/in/phillipwyliehttps://youtube.com/@phillipwylieThe IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast
Tim Berglund is the OG of DevRel. We chat about the art and craft of developer relations, hacking on hardware, and much more.
Storytellinghacker - Get your mind in a complete different experience and FEEL the stories!
I talk about the upcoming trends!Enjoy my come back.
API hacking and bypassing Ubuntu's user namespace restrictions feature in this week's episode, as well as a bug in CimFS for Windows and revisiting the infamous NSO group WebP bug.Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/279.html[00:00:00] Introduction[00:00:28] Next.js and the corrupt middleware: the authorizing artifact[00:06:15] Pwning Millions of Smart Weighing Machines with API and Hardware Hacking[00:20:37] oss-sec: Three bypasses of Ubuntu's unprivileged user namespace restrictions[00:32:10] CimFS: Crashing in memory, Finding SYSTEM (Kernel Edition)[00:43:18] Blasting Past Webp[00:47:50] We hacked Google's A.I Gemini and leaked its source code (at least some part)Podcast episodes are available on the usual podcast platforms: -- Apple Podcasts: https://podcasts.apple.com/us/podcast/id1484046063 -- Spotify: https://open.spotify.com/show/4NKCxk8aPEuEFuHsEQ9Tdt -- Google Podcasts: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy9hMTIxYTI0L3BvZGNhc3QvcnNz -- Other audio platforms can be found at https://anchor.fm/dayzerosecYou can also join our discord: https://discord.gg/daTxTK9
In this episode, Geoff and Skyler dive deep into hardware hacking with Rob Simon! Rob is the Mobile and Hardware Security Practice Lead at TrustedSec and shares the deets on hardware security assessments. The importance of hardware fundamentals in security, especially when it comes to IoT devices, is one of the key takeaways this week. Rob answers questions like: Who needs hardware assessments? What tools and techniques are used? And what potential vulnerabilities are associated with IoT devices? Join us for great discussion, stay for the lolz, and clutch your Flipper Zeros tight! About this podcast: Security Noise, a TrustedSec Podcast hosted by Geoff Walton and Producer/Contributor Skyler Tuter, features our cybersecurity experts in conversation about the infosec topics that interest them the most. Hack the planet!
Vulnrichment (I just like saying that word), Trustworthy Computing Memo V2, SSID confusion, the Flipper Zero accessory for Dads, the state of exploitation, Hackbat, Raspberry PI Connect, leaking VPNs, exploiting faster?, a new Outlook 0-Day?, updating Linux, and a 16-year-old vulnerability. Show Notes: https://securityweekly.com/psw-829
Vulnrichment (I just like saying that word), Trustworthy Computing Memo V2, SSID confusion, the Flipper Zero accessory for Dads, the state of exploitation, Hackbat, Raspberry PI Connect, leaking VPNs, exploiting faster?, a new Outlook 0-Day?, updating Linux, and a 16-year-old vulnerability. Show Notes: https://securityweekly.com/psw-829
In this episode of InTechnology, Camille gets into hardware attacks with Maggie Jauregui, a hardware security researcher at Intel. They talk about Maggie's “secret superpower” of joy rooted in her Latin American upbringing, her first hardware hacking experiment with a hairdryer, the physics of hardware hacking, iSTARE's proactive research, the possibility of remote hardware attacks, and Maggie's positive outlook on hardware security. The views and opinions expressed are those of the guests and author and do not necessarily reflect the official policy or position of Intel Corporation.
Drei Mitglieder der 7h3B14ckKn1gh75 reden über die Entstehung einer legalen Gruppe, selbst-gebastelte EMPs, Hardware-Hacking und Schwachstellen in alten Spielen.
Hay una interesante y extensa historia de la música y las máquinas, desde los Wayangs del teatro religioso de Java y Balihasta las marionetas chinas de los teatros de sombras, desde el Reloj sirio de Gazahasta los robots de Kratfwerk y la música autogenerativa del siglo XXI._____Has escuchado“Athanasius Kircher, Antidotum Tarantulae - Tarantella”. Gabriele Giacomelli, órgano. YouTube Vídeo. Publicado por Associazione Prato per Zipoli, 13 de enero de 2020: [Vídeo]“David Roentgen's Automaton of Queen Marie Antoinette, The Dulcimer Player (La Joueuse de Tympanon)”. YouTube Vídeo. Publicado por The Met, 24 de octubre de 2012: [Vídeo]“‘Floutiste', Life-size Flute Player Automaton by A. Theroude, Paris, France, c. 1869-77”. YouTube Vídeo. Publicado por Morris Museum, 3 de diciembre de 2012: [Vídeo]“Jean Tinguely's Four Méta-Harmonie Music Machines at Museum Tinguely, Basel”. YouTube Vídeo. Publicado por VernissageTV, 20 de octubre de 2016: [Vídeo]“Luigi Russolo: Serenata per intonarumori e strumenti”. YouTube Vídeo. Publicado por TheWelleszCompany, 27 de enero de 2011: [Vídeo]“Poema sinfónico para 100 metrónomos de György Ligeti”. YouTube Vídeo. Publicado por Adolfo García Yagüe, 23 de enero de 2014: [Vídeo] _____ Selección bibliográficaARACIL, Alfredo, Música sobre máquinas y máquinas musicales. Desde Arquímedes a los medios electroacústicos. Fundación Juan March, 1984: [PDF]*BIJSTERVELD, Karin, Mechanical Sound: Technology Culture, and Public Problems of Noise in the Twentieth Century. The MIT Press, 2008BOWN, Ollie, Beyond the Creative Species: Making Machines That Make Art and Music. The MIT Press, 2021BROWN, Barclay, “The Noise Instruments of Luigi Russolo”. Perspectives of New Music, vol. 20, n.º 1-2 (1981), pp. 31-48*CHESSA, Luciano, Luigi Russolo Futurist: Noise Visual Arts and the Occult. University of California Press, 2012COLLINS, Nicolas y Simon Lonergan, Handmade Electronic Music: The Art of Hardware Hacking. Routledge, 2020GAVIN, Williams, “A Voice of the Crowd: Futurism and the Politics of Noise”. 19th-Century Music, vol. 37, n.º 2 (2013), pp. 113-129*HIRT, Katherine Maree, When Machines Play Chopin: Musical Spirit and Automation in Nineteenth-Century German Literature. Walter De Gruyter, 2010HOPKIN, Bart y Sudhu Tewari (eds.), Sound Inventions: Selected Articles from Experimental Musical Instruments. Routledge, 2021*KOSTELANETZ, Richard, “Artistic Machines”. Chicago Review, vol. 23, n.º 1 (1971), pp. 116-133*MOLINA ALARCÓN, Miguel, “De la ‘máquina de hablar' a la ‘máquina de dormir': máquinas sonoras y musicales pre-electroacústicas en España, 1860-1944”. En: ¡Chum, chum, pim, pam, pum, olé!: pioneros del arte sonoro en España, de Cervantes a las vanguardias. Editado por Miguel Molina Alarcón. Weekend Proms, 2017PARDO, Carmen, “La sensibilidad de la máquina: el circuito sonoro”. Acto: Revista de Pensamiento Artístico Contemporáneo, n.º 1 (2002), pp. 43-56*PATTESON, Thomas, Instruments for New Music: Sound, Technology, and Modernism. University of California Press, 2016*RICHARDS, Timothy, “Performing Objects: Technology without Purpose”. Leonardo, vol. 17, n.º 4 (1984), pp. 237-240*RUSSOLO, Luigi, “El arte de los ruidos”. Sin Título, n.º 3 (1996), pp. 5-50: [PDF]RUSSOLO, Luigi et al., Art of Noise Destruction of Music by Futurist Machines. Deicide, 2023SARMIENTO, José Antonio, “Los ‘ruideros' de Luigi Russolo y su impacto en la prensa española de la época, 1913-1933”. En: ¡Chum, chum, pim, pam, pum, olé!: pioneros del arte sonoro en España, de Cervantes a las vanguardias. Editado por Miguel Molina Alarcón. Weekend Proms, 2017TINGUELY, Jean et al., Méta-Harmonie: Music Machines and Machine Music in Jean Tinguely's Oeuvre. Museum Tinguely, 2016VENN, Edward, “Rethinking Russolo”. Tempo, vol. 64, n.º 251 (2010), pp. 8-16*ZARIPOV, R. Kh. y J. G. K. Russell, “Cybernetics and Music”. Perspectives of New Music, vol. 7, n.º 2 (1969), pp. 115-154* *Documento disponible para su consulta en la Sala de Nuevas Músicas de la Biblioteca y Centro de Apoyo a la Investigación de la Fundación Juan March
The Security Weekly crew dives into a discussion on the latest hardware hacking techniques, including the hardware/software/firmware used to conduct various tests and create neat projects. You may be trying to hack a specific device. You may be creating a device to accomplish a specific goal. We will discuss various aspects of hardware hacking and fill you in on the some of the latest devices and tools. Like the Flipper Zero, and why the alternatives are better in some cases, but also why the Flipper Zero gets a bad rap. Show Notes: https://securityweekly.com/psw-809
Join us for a special extended holiday edition of Paul's Security Weekly! Hosts from all the Security Weekly shows join us from around the country to kick off the end of the year in style. We begin with our first panel on Supply Chain, then discuss Hardware Hacking, Vulnerability Management and Disclosure, and wrap up with the news. Visit https://www.securityweekly.com/psw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/psw-809
The Security Weekly crew dives into a discussion on the latest hardware hacking techniques, including the hardware/software/firmware used to conduct various tests and create neat projects. You may be trying to hack a specific device. You may be creating a device to accomplish a specific goal. We will discuss various aspects of hardware hacking and fill you in on the some of the latest devices and tools. Like the Flipper Zero, and why the alternatives are better in some cases, but also why the Flipper Zero gets a bad rap. Show Notes: https://securityweekly.com/psw-809
Join us for a special extended holiday edition of Paul's Security Weekly! Hosts from all the Security Weekly shows join us from around the country to kick off the end of the year in style. We begin with our first panel on Supply Chain, then discuss Hardware Hacking, Vulnerability Management and Disclosure, and wrap up with the news. Visit https://www.securityweekly.com/psw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/psw-809
Our good friend Matt Carpenter joins us to share his thoughts on what's going on in the world of AI and LLMs. Matt is also a hacker specializing in hardware and the crew has some amazing hardware hacking topics to discuss (as usual). Segment Resources: https://garymarcus.substack.com/p/has-sam-altman-gone-full-gary-marcus Show Notes: https://securityweekly.com/psw-808
Our good friend Matt Carpenter joins us to share his thoughts on what's going on in the world of AI and LLMs. Matt is also a hacker specializing in hardware and the crew has some amazing hardware hacking topics to discuss (as usual). Segment Resources: https://garymarcus.substack.com/p/has-sam-altman-gone-full-gary-marcus Show Notes: https://securityweekly.com/psw-808
Firmware security is complex and continues to be an industry challenge. In this podcast we'll talk about the reasons firmware security remains a challenge and some best practices around platform security. Segment Resources: https://www.helpnetsecurity.com/2020/04/27/firmware-blind-spots/ https://www.helpnetsecurity.com/2020/09/28/hardware-security-challenges/ https://darkreading.com/application-security/4-open-source-tools-to-add-to-your-security-arsenal https://chipsec.github.io Hardware Hacking created by Maggie: https://securityweekly.com/wp-content/uploads/2021/08/eArt-2.png Visit https://securityweekly.com/asw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/secweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/vault-asw-5
Firmware security is complex and continues to be an industry challenge. In this podcast we'll talk about the reasons firmware security remains a challenge and some best practices around platform security. Segment Resources: https://www.helpnetsecurity.com/2020/04/27/firmware-blind-spots/ https://www.helpnetsecurity.com/2020/09/28/hardware-security-challenges/ https://darkreading.com/application-security/4-open-source-tools-to-add-to-your-security-arsenal https://chipsec.github.io Hardware Hacking created by Maggie: https://securityweekly.com/wp-content/uploads/2021/08/eArt-2.png Show Notes: https://securityweekly.com/vault-asw-5
Firmware security is complex and continues to be an industry challenge. In this podcast we'll talk about the reasons firmware security remains a challenge and some best practices around platform security. Segment Resources: https://www.helpnetsecurity.com/2020/04/27/firmware-blind-spots/ https://www.helpnetsecurity.com/2020/09/28/hardware-security-challenges/ https://darkreading.com/application-security/4-open-source-tools-to-add-to-your-security-arsenal https://chipsec.github.io Hardware Hacking created by Maggie: https://securityweekly.com/wp-content/uploads/2021/08/eArt-2.png Visit https://securityweekly.com/asw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/secweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/vault-asw-5
Firmware security is complex and continues to be an industry challenge. In this podcast we'll talk about the reasons firmware security remains a challenge and some best practices around platform security. Segment Resources: https://www.helpnetsecurity.com/2020/04/27/firmware-blind-spots/ https://www.helpnetsecurity.com/2020/09/28/hardware-security-challenges/ https://darkreading.com/application-security/4-open-source-tools-to-add-to-your-security-arsenal https://chipsec.github.io Hardware Hacking created by Maggie: https://securityweekly.com/wp-content/uploads/2021/08/eArt-2.png Show Notes: https://securityweekly.com/vault-asw-5
O tema hardware hacking está em alta, e muito se deve ao aumento de dispositivos smarts, com inúmeras funções, acesso à rede. Mas e como fica a proteção da empresa, quando precisa trafegar ou processar dados nestes equipamentos? E nos casos onde a informação não passa por ele, mas a sua capacidade de processamento pode ser um ofensor dentro da sua empresa? Por estas e outras, que temos profissionais de hardware hacking para avaliar nossos equipamentos. #FabioSobiecki #BlueTeamAcademy #SegurançadaInformação __________________ Siga minhas redes https://www.youtube.com/@fabiosobiecki https://www.instagram.com/fabiosobiecki https://www.facebook.com/fabiosobieckioficial https://www.tiktok.com/@fabiosobiecki
Episode 22: In this episode of Critical Thinking - Bug Bounty Podcast we talk about some basic/intermediate concepts related to Hardware Hacking. Specifically, we dive into extracting data from eMMC chips in order to get our hands on source code for IoT devices. Don't miss this episode packed with valuable insights, tips, and strategies for beginners and seasoned bug bounty hunters alike!Follow us on twitter at: @ctbbpodcastWe're new to this podcasting thing, so feel free to send us any feedback here: info@criticalthinkingpodcast.ioShoutout to YTCracker for the awesome intro music!------ Links ------Follow your hosts Rhynorater & Teknogeek on twitter:https://twitter.com/0xteknogeekhttps://twitter.com/rhynoraterCheckout NahamCon:https://bit.ly/42vnpMSRiverLoop Security Write-up: https://bit.ly/3oSKL1oGood Chip-Off Write-up:https://bit.ly/3IWym3qScratching chips to expose pins:https://bit.ly/45Tj21ihttps://bit.ly/3oJJt8ZChat with Corben on Degrees: https://youtu.be/N9P5PUx-PNQ?t=2311Gareth Hayes Tweet:https://bit.ly/3qvFNYWHuntress - John Hammond - MoveIt Response:https://bit.ly/42vTTXvCritical Thinking Hardware Hacking Setup - See the gear we're talking about (Affiliate links): https://linke.to/hardwarehackingsetTimestamps:(00:00:00) Introduction(01:03) NahamCon's Live Hacking Event and Justin's Presentation on PCI DSS(02:40) Depreciation of Data URLs in SVG Use Element(04:55) Gareth Hayes and knowledge sharing in the hacking community(07:50) Move It vulnerability and and John Hammond's epic 4 am rants(12:18) Identifying promising leads in bug bounty hunting, and knowing when to move on(Start of main content)(21:40) Hardware Recon, and using Test Pins to Access EMMC Chip(26:16) Identifying Chip Pinouts and Continuity Testing(29:01) Using Logic Analyzers for Hardware Hacking(33:01) Importance of Fundamental Knowledge in Hacking, and the benefits of understanding Electrical Engineering(35:46) Replay Protected Memory Block Protocol(40:00) Bug Bounty Programs and Hardware Testing Support(41:05) Chip Pulling techniques and Essential Equipment for Hardware Hacking(59:50) Tips for Buying Hardware Hacking Tools: Research and Specific Use Cases(01:06:35) Hardware Hacking: Just scratching the surface.(01:08:45) Vulnerability Disclaimer: Pulling OS from a chip does not constitute a Vulnerability.
Welcome back to the show! Today we have guest Amit Serper Director of Security Research at Sternum. At Sternum, Mr. Serper is tasked with researching hardware or "Hardware Hacking," where he takes apart specific devices to gain access to them. Mr. Serpers say's, "Our approach to security at Sternum is, we know those devices are vulnerable for various reasons, but when developers write the code, we know they do not have security in mind. Our job is to understand the vulnerability that is on these devices." Security structures are not up to date on most devices, causing exploitation or vulnerability. Join in today's Episode of NewCyberFrontier. Visit our sponsors: BlockFrame Inc. IEEE Digital Privacy
#SecurityConfidential #DarkRhinoSecurity John Shegerian (pronounced "SHUH-GARE-EE-UHN") is the co-founder and Chairman/CEO of ERI, the largest fully integrated IT and electronics asset disposition provider and cybersecurity-focused hardware destruction company in the United States. He is also the co-author of the #1 best-selling book "The Insecurity of Everything: How Hardware Data Security is Becoming the Most Important Topic in the World” and the host of the IMPACT podcast. 00:00 Introduction 00:10 Our Guest 01:34 Johns Origin Story 05:34 The secret to success: Doing good for others 07:56 Advice for Future Entrepreneurs 11:00 ERI: SOC2 Compliance 12:05 What are the steps for recycling electronics? 15:33 Gold, Copper, Precious Metals 18:30 Is there a recycling issue forming with EV cars? How JB Straubel is involved 25:21 Hardware Hacking 30:55 What to do before throwing electronics away 38:07 Anything you can't recycle? 42:03 A FREE COPY OF JOHNS BOOK 44:33 Johns Book 47:11 Rental Car Agencies 48:20 Anything new for John ---------------------------------------------------------------------- To learn more about John visit https://johnshegerian.com To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ---------------------------------------------------------------------- Articles Mentioned United Nations Article: https://ewastemonitor.info/gem-2020/ https://www.businesswire.com/news/home/20170914006135/en/Fortune-Magazine-Calls-Electronic-Waste-%E2%80%98Dead-but-Not-Forgotten%E2%80%99----ERI-Featured-in-Report-About-Cybersecurity https://fortune.com/2017/09/06/electronic-waste-recycling-cybersecurity/ Information and photos about John: https://impactpodcast.com/ https://eridirect.com/category/news/ https://johnshegerian.com/gallery/ https://eridirect.com/ 1992 LA Rodney King Riots: https://www.britannica.com/event/Los-Angeles-Riots-of-1992 https://www.npr.org/2017/04/26/524744989/when-la-erupted-in-anger-a-look-back-at-the-rodney-king-riots https://www.nbclosangeles.com/news/local/timeline-rodney-king-beating-lapd-verdict-1992-la-riots/2880027/
A Linux jailbreak that's a win for Right to Repair, our favorite things in Android 13, and the major features that just missed the Linux 6.0 window.
A Linux jailbreak that's a win for Right to Repair, our favorite things in Android 13, and the major features that just missed the Linux 6.0 window.
The fastest-growing part of the world's waste stream is e-waste (unwanted or unusable consumer electronics). This is because technology continues to improve or evolve faster and faster, so electronics become outdated more quickly. Electronic items should not be thrown in the trash (or in landfills) because they contain toxins such as lead, mercury, and cadmium that can leach into the soil and water supplies. For these reasons alone, all electronics should be responsibly recycled. But they seldom are. A company called ERI specializes in the environmentally safe and socially responsible dismantling of electronic waste and ensures 100% data destruction and compliance. John Shegerian is the co-founder and Chairman/CEO of ERI. He is also the author of a book about hardware hacking called the Insecurity of Everything, which went to #1 on Amazon in the cybersecurity category. I invited him on Tech Talks Daily to discuss the scale of the problem and how e-waste plays a pivotal role in the circular economy. We discuss e-waste and data protection and the trends he believes will continue. I also learn more about the most significant factor driving the need for efficient data destruction and how serious a problem hardware hacking is. John also shares real-world examples of devices that store personal data that people don't even think about.
In this episode, Sara Drakeley interviews Bunnie Huang, security researcher, hacker, and entrepreneur. Bunnie wrote the book, Hacking the Xbox: An Introduction to Reverse Engineering. He also helped create Chumby, a consumer electronics product designed to be modified by users and provide hackable widgets. Bunnie and Sara dive into trust models and Bunnie outlines the challenges of developing evidence-based trust. Sara asks Bunnie for his take on secure enclaves and Bunnie explains why "you shouldn't eat out of your toilet bowl." Sara and Bunnie puzzle the biggest security flaw of all - humans.
John Shegerian, Co-Founder, Chairman and CEO of Electronic Recyclers International - ERI discusses his journey through recycling electronic waste for environmental and sustainability reasons, the importance of data protection, insights on hardware hacking, and the responsibility that consumers have when disposing of our old devices.
In this episode you will hear John's insights on how to prevent hardware hacking by recycling data-storing devices. John Shegerian is a Chairman and CEO of ERI. He has also written the best-seller, "The Insecurity of Everything". To get your free copy of John's book "The Insecurity of Everything" please send him an email to jss@eridirect.com and mention Risk Management show in your request We discussed the following topics among others: How serious a problem is hardware hacking? Is e-waste more an environmental problem or a data security issue? What are some devices that store personal data that people don't even think about? How has the COVID-19 Pandemic changed the cybersecurity landscape? and more... If you want to be our guest, or you know some one who would be a great guest on our show, just send your email to info@globalriskconsult.com with a subject line “Global Risk Community Show” and give a brief explanation of what topic you would like to to talk about and we will be in touch with you asap.
In this episode of the Hack the Planet Podcast: Joe Fitzpatrick of SecuringHardware.com is the best known hardware security trainer on the planet. We talk to him about how he … Continue reading "Securing Hardware with Joe Fitz"
This week, Mat and Mike talk with Joe Grand from Grand Idea Studio. They chat about Joe's recent crypto wallet hardware hack, his past with the L0pht, and what it means to be a "hacker."------------------------Check out Joe GrandYouTube: youtube.com/c/JoeGrandTwitter: @JoeGrand-------------------------Announcements:Interested in PCAP, visit purdue.edu/pcapWant to learn more about CERIAS Security Symposium, visit https://www.cerias.purdue.edu/site/symposium-------------------------Stay current with cyberTAP:cyber.tap.purdue.edu/blogFollow us on all the things:Twitter: @PCyberTAPLinkedIn: Purdue cyberTAPEmail the Cyber Tap with suggestions (or be a guest)cybertappodcast@purdue.eduTo learn more about Purdue cyberTAP's education and professional services, visit cyber.tap.purdue.edu
On this episode of The Vonu Podcast, you'll hear a Liberty Under Attack Radio classic from August 2017. I'm joined by Jamin Biconik, a “hardware hacker,” permaculture farmer, and agorist. Jamin is the developer of the Ghostpad privacy-oriented machines, Neuron, his custom Linux-based operating system, and a number of other projects. Herein,… The post TVP #143: Hardware Hacking with Jamin Biconik (An LUA Radio Classic) appeared first on The Vonu Podcast.
John Shegerian, Co-Founder and Chairman/CEO of ERI and co-author of the cybersecurity book, "the Insecurity of Everything" will be presenting a talk about cybersecurity titled “The Insecurity of Everything: How Hardware Data Security is Becoming the Most Important Topic in the World” and will share some of the latest information about the very real problem of hardware hacking in the world of healthcare and beyond and how that issue became even more serious during the pandemic, with so many people working from home. He will also be explaining critical information for health-related businesses to help them keep their private data – and the data of their patients and customers – protected!
John Shegerian, Co-Founder and Chairman/CEO of ERI and co-author of the cybersecurity book, "the Insecurity of Everything" will be presenting a talk about cybersecurity titled “The Insecurity of Everything: How Hardware Data Security is Becoming the Most Important Topic in the World” and will share some of the latest information about the very real problem of hardware hacking in the world of healthcare and beyond and how that issue became even more serious during the pandemic, with so many people working from home. He will also be explaining critical information for health-related businesses to help them keep their private data – and the data of their patients and customers – protected! The post Hardware Hacking Trends – The Insecurity of Everything: Audio Version of the Webinar appeared first on First Healthcare Compliance.
Hardware hacking isn't a topic most network engineers are familiar with—but we always used to say that if I can get access to the console of a router, I can eventually get into the box. The same is largely true of all kinds of computing hardware, including laptops, compute nodes connected to a data center fabric, and, again, routers and switches. In this episode of the Hedge, Federico Lucifredi joins Tom Ammon and Russ White to discuss the many options hardware hackers have today.
The Enormous Issues | Audacious Ideas Podcast is available on your favorite podcast app!EIAI talks about issues shaping our world and the technologies that are contributing to that change. We discuss AUDACIOUS technology and culture-related IDEAS that are cutting-edge, provocative, and sometimes really out there. Our content is aimed at an open-minded, innovative, global, and adult audience with an eye on the future. Our goal is to push the thinking, throw as many yellow stickies at the whiteboard as possible and have fun while we do it. We hold space for open dialog, robust debate and the diverse opinions of our guests. This is what makes this podcast awesome! Sending love and peace to you all. EIAI episodes drop every Tuesday. Visit The EIAI Website: https://www.theartfulladder.com/podcastLISTENING LINKSEIAI on Apple: https://apple.co/3s7kcRG EIAI on Google: https://bit.ly/3a31eFpEIAI on Spotify: https://spoti.fi/3d97ihMFOLLOW AND GET IN TOUCH: Instagram: @audaciousideas @rhea_naidoo_ ClubHouse: @RheaNaidoo Twitter: @rheanaidoo_#technology #technologypodcast #worldissues #futuretech #clubhouse
This week we talk about the Coventry Blitz Conspiracy, Supermicro, and Fancy Bear.We also discuss state-sponsored hacking, the CIA, and Pearl Harbor. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit letsknowthings.substack.com/subscribe