Bus Pirate and the MCP4725 DAC via I2C

Bus Pirate and the MCP4725 DAC via I2C.  Wow.  What a mouthful.  Following up on one of the most popular posts (SparkFun DAC Breakout Board Tutorial) in this guide we will take a look at controlling the MCP4725 DAC via the I2C protocol using a Bus Pirate from Dangerous Prototype.  Before we get started let’s…

Read More

Expanding Your Horizons … And Your Ports

One frustrating aspect of designing a project around a microcontroller is the realization that you don’t have enough GPIO pins to drive all the all components you want to include. If you are lucky there are larger chips with the same architecture you have chosen (think going from and Arduino Uno to an Arduino Mega)….

Read More

GoR 87: Internet All The Things!

Gears of Resistance #87 for December 2, 2018 http://greenshoegarage.com/podcast/GOR/2018/GOR_0087_2DEC18.mp3 This week we cover: California to Regulate IoT Thieves Steal Tesla, Hacked the Keyfob RF Dragos Raises $37M for Industrial Control Cybersecurity LoC Let’s You Freely Hack Your Own Devices Farmers and the Fight for the Right to Repair Embedded Systems Arduino and Raspberry Pi Offers…

Read More

Arduino Inks IoT Deal With Telstra

At the end of the November 2018 Australian teleco Telstra announced they were partnering with open source hardware leader Arduino to bring next-generation networks and hardware to Australian developers and engineers. As part of the deal, Telstra will sell local developers the forthcoming MKR NB 1500 development board along with a M2M SIM card. The…

Read More

Hardware Tools with IoT Security Applicability

Over the past few years, cybersecurity has entered the public consciousness thanks to attacks that had direct effects on consumers privacy. Attacking traditional Information Technology (IT) systems such as desktop computers and servers can almost be a trivial matter for attackers with even moderate skills. Thanks to the plethora of software tools available and the…

Read More

Demystifying Firmware Debugging

Debugging embedded systems and associated firmware can be more art than science. Is the problem in hardware or is it in software? Both? The ability to understand what’s going inside the processor at any given moment is key to troubleshooting. The difficulty in achieving this deep is understanding is compounded for systems integrators that are…

Read More

GoR Podcast 86: IoT Hacks, Command Lines, Python GUIs and Parts Inventory

Gears of Resistance #86 for September 3, 2018 http://greenshoegarage.com/podcast/GOR/2018/GOR_0086_3SEP18.mp3 This week we cover: PySimpleGUI TensorFlow on Raspberry Pi Inventory:  OpenBOM |PartsBox.io |Mouser Inventory Management Arduino Command Line Interface Police Camera Vulnerabilities Hacking Networks via Fax Machines IoT BotNets to attack Energy Grid Demand [Download] For more DIY/Maker, OSHW, FOSS, CyberSec, and STEAM news follow along…

Read More

GoR Podcast 85: IoT Securitygasm

Gears of Resistance #85 for August 14, 2018 http://greenshoegarage.com/podcast/GOR/2018/GOR_0085_14AUG18.mp3 This week we cover: EECatalog Arduino MKR Vidor 4000 | CAN Shield | RS485 Shield Microchip ECC508A CryptoAuthentication Chip Microsoft Azure Sphere | 7 Properties of Secured Devices Embedded Vulnerability Assessment Tools Google Tensor Processing Unit Hardware Apple Joins Smart Home Mesh Networking Standards Group WannaCry…

Read More

Open Hardware or Secure IoT: Is It a Mutually Exclusive Choice?

Despite the eye rolls sometimes given to the name “Internet of Things” or IoT for short, no one is arguing that the future isn’t connected. Market soothsayers such as Business Insider recently release their revised 2018 IoT market predictions. Some highlights include 1 billion installed IoT devices in just U.S. homes will occur by 2023….

Read More

Primer on Embedded Side Channel Attacks

“Attack him where he is unprepared, appear where you are not expected.” Sun-Tzu, Art of War For much of the history of embedded systems, many product designers and engineers have had the luxury of building rather closed loop systems with little to no interaction with other systems. A so-called “security through obscurity” was perhaps not…

Read More