shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

264
active users

#hardwarehacking

1 post1 participant0 posts today
Continued thread

Speaking of #HardwareHacking, there's a great, slow and steady, tutorial on creating a #KiCAD project from scratch. It's a TCAL9539 breakout, but can be applied to most other projects you may be working on

Best of all, it goes through the library creation process, which lets you reuse your custom components/layouts elsewhere

youtube.com/watch?v=61uLHVL8qC

There's a pretty nice ongoing #hardwarehacking project called the Evertop

"an ultra lower power, ultra long battery solar PC"

github.com/ericjenott/Evertop

Runs off an ESP32 with an e-Ink display and has a solar panel on the back.

"Evertop is a portable PC that emulates an IBM XT with an 80186 processor and 1MB RAM. It can run DOS, Minix, and some other old 1980s operating systems."

"Runs almost all IBM PC/XT compatible DOS software from the 1980s and early 90s."

Two days until #BSidesBoulder25 and only 15 tickets remain! Today we highlight, two #BSidesBoulder25 talks: Andrew Brandt's "Smashing Smishing by Quashing Quishing" and Eric Harashevsky's "Firmware Readout Bypass in STM92 (Don't put this in an alarm control panel).

Andrew's talk will examine QR-based phishing attacks, how attackers are exploiting QR codes and SMS to steal credentials and MFA tokens, and how a cross-industry collaboration between mobile vendors, telcos, and the infosec community could finally slam the door on mobile phishing. Think SafeBrowsing, but for QR scans! And we promise that our BSidesBoulder event QR codes will not redirect you to an Andrew-controlled C2 server.

Eric's talk will explore his adventure tinkering with an old STM92's firmware - the talk will explore his findings, reverse engineering the legacy microcontroller, bypassing firmware protections, and what that means for devices still hanging on your wall! Expect a live demo that is sure to excite your future hardware hacking journey.

#BSides #BSidesBoulder #CyberSecurity #Quishing #Smishing #MobileSecurity #PhishingDefense #HardwareHacking #FirmwareSecurity

Check out our full schedule at bsidesboulder.org/schedule/

Tickets are available for purchase for our 13 June event here: eventbrite.com/e/bsides-boulde

Looking for aspiring Linux hardware and software hackers to work on NFC-F/FeliCa (Secure NFC) support in Linux! We're interested!

Imagine Linux emulating transit cards— also logging into SEGA (Aime), Namco (BaNaPassPort), Konami (e-Amusement) arcade games!

Join us
@hq and let's turn Linux phones into transit (or arcade) cards! Let's ride the train, on Linux! #nfc #nfcf #felica #linux #hardwarehacking

Continued thread

Some numbers. $2,500 is left on our fundraiser. We're halfway. I'd freaking love to hit that.

But if we can't, bare-bones I need $300 for a generator rental (we are off-grid and fully self-powered. More funds and I'll do bigger solar this gear), $100 for educational decor, and I pulled $700 from my (meager) savings for poorer campers already.

$1,100 would do a LOT.

gofundme.com/f/there-u-glow-ra

So the DEFCON 32 badge can be repurposed into a hardware hacking multi-tool. I flashed the custom firmware FREE-WILi created for the badge. It is limited since I don’t have all available GPIO pins that the Raspberry Pico does but do have some, USB serial, and I2C control. It seems like a bus pirate variant maybe? Someone with actual hardware hacking experience can correct me on that.
#defcon #hardwarehacking #raspberrypi