"hidden coprocessor" is exactly what I want in a security-focused microcontroller: https://www.nxp.com/docs/en/application-note/AN12868.pdf
Google memories (1/x)
y'all going to laugh, but I really believed it. I drank the kool-aid. this was the mid-00s, a tech company with a motto "don't be evil" still felt daring rather than cringe – for an alienated techie like past me, at least; my politically aware friends tried to warn me; but I didn't realise that Google leveraged its fine-tuned advertising machinery also for recruiting, and I swallowed the whole thing.
See https://osfci.tech for a cool demo.
This post below is in #French.
What the heck is hyperscale? I tried to find out in a new blog post: https://www.kc8apf.net/2020/05/what-the-heck-is-hyperscale/
A #mastodon exclusive! You are invited to play on a *REAL* PDP-8/e running the TSS/8 monitor (TimeSharing System 8) pictured here. There is a user contributed tutorial here:
To connect, ssh email@example.com
If you are unable to connect that means all 6 (yes, just 6) lines are in use. Remember, this is real hardware and there is NO EMULATION happening. It is the real deal! Enjoy!
I'm coming to CanSecWest for the first time in 2020 and I'm bringing "Finding Firmware Implants" training to the Dojo with me. https://cansecwest.com/dojos/2020/firmimplants.html
infosec, training, advertisement
I'll be back at ringzer0 giving a 2-day course on finding firmware implants.
Register now ⚡️