Phil M0OFX<p>Great talk by Aedan Cullen at <a href="https://digipres.club/tags/38c3" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>38c3</span></a> on breaking security on the <a href="https://digipres.club/tags/RP2350" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RP2350</span></a> by glitching the OTP VDD.</p><p><a href="https://streaming.media.ccc.de/38c3/relive/625" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">streaming.media.ccc.de/38c3/re</span><span class="invisible">live/625</span></a></p><p>I expect the bus between the state machine and OTP is like Wishbone or M68K and has a request and an acknowledge, and the data is latched on the ACK. No ACK? Guard word stays in the latch.</p><p><a href="https://digipres.club/tags/ICRE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ICRE</span></a> <a href="https://digipres.club/tags/ICReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ICReverseEngineering</span></a> <a href="https://digipres.club/tags/FaultInjection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FaultInjection</span></a></p>