Grand Idea Studio


The Current State of Hardware Hacking

Thursday, Mar 29th, 2012

Hardware hacking is on the rise and most of the electronics industry is in denial. High-profile attacks against ATMs, voting machines, parking meters, medical devices, and printers were so simple, they should never have been allowed to happen in the first place. Challenges, constraints, and trade-offs are part of any product design, but it’s time security was taken a little more seriously. [ continue ]

Thinking Differently

Tuesday, Oct 18th, 2011

Hackers think differently. They create new, innovative, and novel solutions to technical problems that are often deemed too difficult to solve. From Thomas Edison to Steve Wozniak to Richard Stallman, hackers have helped shape the world we live in. Corporations, on the other hand, are generally more rigid in their approaches to problem solving and are constrained by internal policies. [ continue ]

Perspectives from the L0pht

Thursday, May 20th, 2010

For nearly a decade, Joe Grand of Grand Idea Studio was a member of the infamous hacker collective known as L0pht Heavy Industries in Boston, Massachusetts. Starting in the early 1990s as a clubhouse for local hackers to store computer equipment, tinker with projects, and just hang out, the L0pht (spelled ell-zero-ph-t) ended up as seven close-knit friends changing the face of computer security vulnerability research and disclosure. [ continue ]

Hacks and Attacks: Examples of Electronic Device Compromise

Wednesday, May 19th, 2010

As engineers, we have a responsibility to learn from problems of the past in order to better equip ourselves for designs of the future. This session presents the typical hardware hacking process and some high-profile attacks against electronic devices such as microprocessors, smartcards, and parking meters. [ continue ]

Hardware is the New Software

Sunday, Oct 11th, 2009

Society thrives on an ever increasing use of technology. Electronics are embedded into nearly everything we touch. Hardware products are being relied on for security-related applications and are inherently trusted, though many are completely susceptible to compromise with simple classes of attacks that have been known for decades. [ continue ]


Altium OnTrack Insight

Meet Joe Grand

Altium Stories

Confessions of a Hacker known as ...

The Hacker Next Door Podcast

Hardware Hacker Joe Grand