Grand Idea Studio

Security

An Overview of Hardware-Based Covert Channels

Wednesday, Jun 10th, 2020

Covert channels are methods of surreptitious data transfer used to communicate with or exfiltrate information from a compromised computer system. They can exist within any layer of the system, including hardware, application software, operating system, or network stack. Typically, covert channels are employed on critical, protected, and/or air-gapped assets that an attacker may not be able to access by conventional means. [ continue ]

Through the Eyes of a Hardware Hacker

Wednesday, Oct 2nd, 2019

Within the electronics lifecycle, there lie weaknesses that can be exploited by those looking to subvert, monitor, manipulate, or intentionally damage your product or service. While embedded security is finally a topic discussed by engineers, it is difficult to properly implement given our need to meet stringent development timeframes, budgetary constraints, and manufacturing requirements. [ continue ]

OpticSpy

Monday, Nov 6th, 2017

The OpticSpy modules provide a platform to explore, evaluate, and experiment with optical data transmissions. They capture, amplify, and convert optical signals into digital form that can be analyzed or decoded with a computer. [ continue ]

PCB Deconstruction Techniques

Tuesday, Apr 4th, 2017

Printed Circuit Boards (PCBs), used within nearly every electronic product in the world, are physical carriers for electronic components and provide conductive pathways between them. [ continue ]

Every Cloud has a Silver Lining

Wednesday, Dec 14th, 2016

Security is often overlooked during the design process of electronic devices. “We’ll fix it later,” says the engineer. “It’s not worth the cost until something happens,” says the manager. Poor embedded security practices and a lack of clearly defined security goals increase the risk of a product getting hacked, whether for malicious purposes or bragging rights. [ continue ]

Press

Ampere News

Hacker turns $2 million hack into ...

An Idiot’s Guide to...

How To Pull Off A Crypto-Heist

El País

“Así ‘hackeé' una cartera de ...