
wrongbaud
@wrongbaud
Cars, Bikes, Coffee and Embedded Systems Security | Founder @voidstarsec Training and Consulting
voidstarsec.com/blog/
wrongbaud.github.io
ID: 1124150837633327110
https://voidstarsec.com 03-05-2019 03:17:00
3,3K Tweet
4,4K Followers
1,1K Following

Big thanks to all of our new followers! We just wrapped up an awesome training at ringzerø.training && @[email protected] with a stellar group of hardware hackers! If you want to learn more about hardware hacking and reverse engineering, check out our blog here: voidstarsec.com/blog/



Blog update! I've updated the VoidStar Security LLC blog with tags, categories and some of the most popular links from my old personal blog - check it out here! voidstarsec.com/blog/




📽️RSTCON Replay📽️ 👀Check out another talk from last year's conference youtu.be/-MNPmM9dujs Colin O'Flynn discusses a "new" (but actually old) side channel leakage mechanism that exploits timing jitter of the ubiquitous JTAG signals. "Everything old is new again" is not just



+Info discord.gg/zhtEXGBK Level 1 -> complete labs and test from the book FuzzATM Level 2 -> Advanced firmware emulation & fuzzing Level 3 -> QEMU Internals (writing boards, peripherals, manipulating the emulator) Offering also an intro course on OpenSecurityTraining2 ~ Fall '25








Nice! Sina Kheirkhah (SinSinology) of Summoning Team (SummoningTeam) successfully demonstrated his exploit of Chroma in the AI category. He's off to provide all the details on how he did it. #Pwn2Own #P2OBerlin

