GoR 88: Of Clouds and Certifications

Gears of Resistance #88 for July 24, 2019 http://greenshoegarage.com/podcast/GOR/2019/GOR_0088_24JUL19.mp3 This week we cover: Arduino Create Maker Plan Launches Adafruit.io Plus Arduino Nano 33 Boards | IoT | BLE Sense Arduino MKR GSM 1400 Arduino Fundamentals Certifcation | Guide PyBadge CircuitPython Gumroad [Download] For more DIY/Maker, OSHW, FOSS, CyberSec, and STEAM news follow along on Twitter,…

Read More

Writing Arduino Code using Visual Studio and Visual Micro

In this video, we look at jumping up from the standard Arduino IDE and take a stab at programming use Microsoft’s Visual Studio Community Edition 2017 and third-party extension Visual Micro. We also look at how to put our code under source code control using GitHub. Some of the tools we use: Microsoft Visual Studio…

Read More

GoR 87: Internet All The Things!

Gears of Resistance #87 for December 2, 2018 http://greenshoegarage.com/podcast/GOR/2018/GOR_0087_2DEC18.mp3 This week we cover: California to Regulate IoT Thieves Steal Tesla, Hacked the Keyfob RF Dragos Raises $37M for Industrial Control Cybersecurity LoC Let’s You Freely Hack Your Own Devices Farmers and the Fight for the Right to Repair Embedded Systems Arduino and Raspberry Pi Offers…

Read More

Arduino Inks IoT Deal With Telstra

At the end of the November 2018 Australian teleco Telstra announced they were partnering with open source hardware leader Arduino to bring next-generation networks and hardware to Australian developers and engineers. As part of the deal, Telstra will sell local developers the forthcoming MKR NB 1500 development board along with a M2M SIM card. The…

Read More

Hardware Tools with IoT Security Applicability

Over the past few years, cybersecurity has entered the public consciousness thanks to attacks that had direct effects on consumers privacy. Attacking traditional Information Technology (IT) systems such as desktop computers and servers can almost be a trivial matter for attackers with even moderate skills. Thanks to the plethora of software tools available and the…

Read More

Demystifying Firmware Debugging

Debugging embedded systems and associated firmware can be more art than science. Is the problem in hardware or is it in software? Both? The ability to understand what’s going inside the processor at any given moment is key to troubleshooting. The difficulty in achieving this deep is understanding is compounded for systems integrators that are…

Read More

GoR Podcast 86: IoT Hacks, Command Lines, Python GUIs and Parts Inventory

Gears of Resistance #86 for September 3, 2018 http://greenshoegarage.com/podcast/GOR/2018/GOR_0086_3SEP18.mp3 This week we cover: PySimpleGUI TensorFlow on Raspberry Pi Inventory:  OpenBOM |PartsBox.io |Mouser Inventory Management Arduino Command Line Interface Police Camera Vulnerabilities Hacking Networks via Fax Machines IoT BotNets to attack Energy Grid Demand [Download] For more DIY/Maker, OSHW, FOSS, CyberSec, and STEAM news follow along…

Read More

GoR Podcast 85: IoT Securitygasm

Gears of Resistance #85 for August 14, 2018 http://greenshoegarage.com/podcast/GOR/2018/GOR_0085_14AUG18.mp3 This week we cover: EECatalog Arduino MKR Vidor 4000 | CAN Shield | RS485 Shield Microchip ECC508A CryptoAuthentication Chip Microsoft Azure Sphere | 7 Properties of Secured Devices Embedded Vulnerability Assessment Tools Google Tensor Processing Unit Hardware Apple Joins Smart Home Mesh Networking Standards Group WannaCry…

Read More

Open Hardware or Secure IoT: Is It a Mutually Exclusive Choice?

Despite the eye rolls sometimes given to the name “Internet of Things” or IoT for short, no one is arguing that the future isn’t connected. Market soothsayers such as Business Insider recently release their revised 2018 IoT market predictions. Some highlights include 1 billion installed IoT devices in just U.S. homes will occur by 2023….

Read More

Primer on Embedded Side Channel Attacks

“Attack him where he is unprepared, appear where you are not expected.” Sun-Tzu, Art of War For much of the history of embedded systems, many product designers and engineers have had the luxury of building rather closed loop systems with little to no interaction with other systems. A so-called “security through obscurity” was perhaps not…

Read More