mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,4 Tsd.
aktive Profile

#hardwaresecurity

0 Beiträge0 Beteiligte0 Beiträge heute
Winbuzzer<p>Nvidia Denies GPU Backdoors as China Probe Threatens Renewed H20 Chip Sales</p><p><a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/Nvidia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nvidia</span></a> <a href="https://mastodon.social/tags/NvidiaH20" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NvidiaH20</span></a> <a href="https://mastodon.social/tags/ChipWar" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ChipWar</span></a> <a href="https://mastodon.social/tags/Geopolitics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Geopolitics</span></a> <a href="https://mastodon.social/tags/HardwareSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareSecurity</span></a> <a href="https://mastodon.social/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a></p><p><a href="https://winbuzzer.com/2025/08/06/nvidia-denies-gpu-backdoors-as-china-probe-threatens-renewed-h20-chip-sales-xcxwbn" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winbuzzer.com/2025/08/06/nvidi</span><span class="invisible">a-denies-gpu-backdoors-as-china-probe-threatens-renewed-h20-chip-sales-xcxwbn</span></a></p>
HiSolutions<p>📢New in our Research-Blog: A Tale of Practical Keylogger Forensics</p><p>On a recent engagement, an interesting hardware side quest popped up.<br>A client had found a <a href="https://infosec.exchange/tags/keylogger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>keylogger</span></a> and, naturally, Cass Rebellin and <span class="h-card" translate="no"><a href="https://infosec.exchange/@jrt" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>jrt</span></a></span> wanted to know what the adversary had seen and if they could gather any useful traces towards the perpetrator.<br>The full story 👉<a href="https://research.hisolutions.com/2025/07/a-tale-of-practical-keylogger-forensics/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">research.hisolutions.com/2025/</span><span class="invisible">07/a-tale-of-practical-keylogger-forensics/</span></a></p><p><a href="https://infosec.exchange/tags/ResearchBlog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ResearchBlog</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/HardwareSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareSecurity</span></a></p>
CHERI Alliance<p>One of our founding directors, Mike Eftimakis, sat down with Akshaya Asokan from Information Security Media Group (ISMG) to explore how CHERI is helping tackle one of cybersecurity’s biggest challenges: memory safety.</p><p>CHERI (Capability Hardware Enhanced RISC Instructions) is a hardware-based approach to security, designed to prevent around 70% of today’s common vulnerabilities. Backed by industry leaders and the UK government, we're working to ensure global adoption across the electronics supply chain.</p><p>Watch the interview to learn more about:</p><p>💠 How CHERI addresses memory safety issues<br>💠 Common hardware supply chain vulnerabilities<br>💠 Progress on adoption by chipmakers<br>💠 Scalability challenges associated with CHERI</p><p>🎥 Watch the full interview: <a href="https://www.bankinfosecurity.com/uks-cheri-alliance-expands-to-global-hardware-supply-chain-a-28942" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bankinfosecurity.com/uks-cheri</span><span class="invisible">-alliance-expands-to-global-hardware-supply-chain-a-28942</span></a></p><p><a href="https://infosec.exchange/tags/CHERI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CHERI</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/HardwareSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareSecurity</span></a> <a href="https://infosec.exchange/tags/MemorySafety" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MemorySafety</span></a> <a href="https://infosec.exchange/tags/SecurityByDesign" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityByDesign</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>
Pen Test Partners<p>🔧 Right to repair, but not to fix security?</p><p>Framework’s philosophy empowers users to open, upgrade, and repair their devices. But with great openness comes a security catch.</p><p>On the Framework 13, pressing the chassis intrusion switch 10 times resets the BIOS, removing passwords, Secure Boot, and more.</p><p>We flagged this to Framework. Their response?<br>"It's a feature..."</p><p>That’s risky. This reset might help with recovery, but it also hands an attacker physical access to critical settings.</p><p>Kieran explains the issue, what this means for security, and how to protect your device.</p><p>📌Read here: <a href="https://www.pentestpartners.com/security-blog/framework-13-press-here-to-pwn/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pentestpartners.com/security-b</span><span class="invisible">log/framework-13-press-here-to-pwn/</span></a></p><p><a href="https://infosec.exchange/tags/RightToRepair" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RightToRepair</span></a> <a href="https://infosec.exchange/tags/HardwareSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareSecurity</span></a> <a href="https://infosec.exchange/tags/FrameworkLaptop" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FrameworkLaptop</span></a> <a href="https://infosec.exchange/tags/BIOSReset" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BIOSReset</span></a> <a href="https://infosec.exchange/tags/SecurityByDesign" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityByDesign</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a></p>
David Chisnall (*Now with 50% more sarcasm!*)<p>The <span class="h-card" translate="no"><a href="https://infosec.exchange/@cheri_alliance" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>cheri_alliance</span></a></span> has around a thousand followers on LinkedIn and just joined the Fediverse today. Let’s see how quickly we can get them to more than that here!</p><p><a href="https://infosec.exchange/tags/CHERI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CHERI</span></a> <a href="https://infosec.exchange/tags/MemorySafety" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MemorySafety</span></a> <a href="https://infosec.exchange/tags/HardwareSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareSecurity</span></a> <a href="https://infosec.exchange/tags/FollowFriday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FollowFriday</span></a></p>
No Starch Press<p>For experienced hardware hackers: an advanced guide to fun with microcontrollers. Learn to pull firmware from single-chip computers, even when they're configured against extraction.</p><p>This book details a wide variety of techniques, so you can reproduce real-world chip exploits in your own lab. Plus, find encyclopedic coverage of vulnerabilities for your hardware security work. </p><p><a href="https://nostarch.com/microcontroller-exploits" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nostarch.com/microcontroller-e</span><span class="invisible">xploits</span></a></p><p><a href="https://mastodon.social/tags/HardwareSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareSecurity</span></a> <a href="https://mastodon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://mastodon.social/tags/Microcontroller" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microcontroller</span></a> <a href="https://mastodon.social/tags/ExploitDevelopment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExploitDevelopment</span></a> <a href="https://mastodon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>
Joseph Zikusooka (ZIK)<p>Had a great time at <span class="h-card" translate="no"><a href="https://fosstodon.org/@opensuse" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>opensuse</span></a></span> Conference 2025 in Nuremberg! A highlight was the hands-on workshop by @tropicsquar, showcasing <a href="https://mastodon.social/tags/TROPIC01" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TROPIC01</span></a> — the first open and auditable secure element. A big step for verifiable hardware <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> in <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> systems, edge devices &amp; secure infrastructure.</p><p>Thanks to the Tropic Square team for the great session and the devkit</p><p><a href="https://mastodon.social/tags/HardwareSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareSecurity</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.social/tags/EdgeComputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EdgeComputing</span></a> <a href="https://mastodon.social/tags/TROPIC01" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TROPIC01</span></a> <a href="https://mastodon.social/tags/TrustedHardware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TrustedHardware</span></a> <a href="https://mastodon.social/tags/SecureChips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureChips</span></a><br><a href="https://mastodon.social/tags/IoTSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IoTSecurity</span></a> <a href="https://mastodon.social/tags/NoObscurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NoObscurity</span></a> <a href="https://mastodon.social/tags/OpenHardware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenHardware</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a></p>
CHERI Alliance<p>👋 Hey infosec.exchange! We’re the CHERI Alliance — excited to join the community!</p><p>🔐 We’re all about CHERI (Capability Hardware Enhanced RISC Instructions) — a powerful hardware-based approach to making memory safety and software security actually enforceable, by design.</p><p>💡 CHERI helps stop things like buffer overflows and use-after-free bugs before they cause trouble — with hardware-enforced protections built right into the architecture.</p><p>We’re here to:<br>- Share news about the CHERI community in general<br>- Talk about what our members are building with CHERI<br>- Connect with folks who care about deep, meaningful security improvements<br>Check us out 👉 cherialliance.org</p><p>Give us a follow if this sounds like your kind of thing!</p><p><a href="https://infosec.exchange/tags/CHERI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CHERI</span></a> <a href="https://infosec.exchange/tags/MemorySafety" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MemorySafety</span></a> <a href="https://infosec.exchange/tags/SecureByDesign" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureByDesign</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/HardwareSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareSecurity</span></a></p>
Seth G.<p>Has anyone done a proper <a href="https://chaos.social/tags/HardwareSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareSecurity</span></a> analysis on the <a href="https://chaos.social/tags/Fairphone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fairphone</span></a> yet? I know <span class="h-card" translate="no"><a href="https://grapheneos.social/@GrapheneOS" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>GrapheneOS</span></a></span> has said, "it doesn't meet their requirements" (fair enough), but what about for the OEM-installed <a href="https://chaos.social/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> ROM?</p><p><a href="https://chaos.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://chaos.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a></p>
Purism<p>The Liberty Phone delivers uncompromising security for government communications- No Surveillance.</p><p>Link to Video: <a href="https://puri.sm/posts/the-liberty-phone-secure-government-mobility/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">puri.sm/posts/the-liberty-phon</span><span class="invisible">e-secure-government-mobility/</span></a> </p><p><a href="https://social.librem.one/tags/LibertyPhone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LibertyPhone</span></a> <a href="https://social.librem.one/tags/MadeInUSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MadeInUSA</span></a> <a href="https://social.librem.one/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChainSecurity</span></a> <a href="https://social.librem.one/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://social.librem.one/tags/PureOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PureOS</span></a> <a href="https://social.librem.one/tags/EndToEndEncryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EndToEndEncryption</span></a> <a href="https://social.librem.one/tags/HardwareSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareSecurity</span></a> <a href="https://social.librem.one/tags/GOTSSolution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GOTSSolution</span></a> <a href="https://social.librem.one/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a></p>
Purism<p>The Liberty Phone delivers uncompromising security for government communications- No Surveillance. </p><p><a href="https://puri.sm/products/liberty-phone/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">puri.sm/products/liberty-phone</span><span class="invisible">/</span></a> </p><p><a href="https://social.librem.one/tags/LibertyPhone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LibertyPhone</span></a> <a href="https://social.librem.one/tags/SecureGovMobile" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureGovMobile</span></a> <a href="https://social.librem.one/tags/MadeInUSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MadeInUSA</span></a> <a href="https://social.librem.one/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChainSecurity</span></a> <a href="https://social.librem.one/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://social.librem.one/tags/PureOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PureOS</span></a> <a href="https://social.librem.one/tags/EndToEndEncryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EndToEndEncryption</span></a> <a href="https://social.librem.one/tags/HardwareSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareSecurity</span></a> <a href="https://social.librem.one/tags/GOTSSolution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GOTSSolution</span></a> <a href="https://social.librem.one/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a></p>
Privacy Guides<p>Always remember, when it comes to hardware security keys: Two is one, one is none.</p><p>Our latest article covers the setup process for two YubiKeys (from Yubico's YubiKey 4 or 5 series) to keep your online accounts safe and secure 🔒 + it goes through resetting your existing keys to a blank slate, and the reasons you might want to do so!</p><p><a href="https://www.privacyguides.org/articles/2025/03/06/yubikey-reset-and-backup/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">privacyguides.org/articles/202</span><span class="invisible">5/03/06/yubikey-reset-and-backup/</span></a></p><p><a href="https://mastodon.neat.computer/tags/YubiKey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>YubiKey</span></a> <a href="https://mastodon.neat.computer/tags/HardwareSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareSecurity</span></a> <a href="https://mastodon.neat.computer/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://mastodon.neat.computer/tags/Yubico" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Yubico</span></a> <a href="https://mastodon.neat.computer/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mastodon.neat.computer/tags/PrivacyGuides" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PrivacyGuides</span></a> <a href="https://mastodon.neat.computer/tags/Article" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Article</span></a></p>
Chris Gammell<p>I chatted with the embedded team at Raspberry Pi about the <a href="https://chaos.social/tags/RP2350" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RP2350</span></a> on The Amp Hour. It's an amazing "dual dual-core" part that is finding its way into many products. We chatted <a href="https://chaos.social/tags/hardwaresecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hardwaresecurity</span></a> and <a href="https://chaos.social/tags/lowpower" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lowpower</span></a>, as those were key enhancements over the <a href="https://chaos.social/tags/RP2040" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RP2040</span></a>. </p><p><a href="https://theamphour.com/687-the-rp2350-with-the-raspberry-pi-team/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">theamphour.com/687-the-rp2350-</span><span class="invisible">with-the-raspberry-pi-team/</span></a></p>
Pen Test Partners<p>Think your data is safe?</p><p>Dive into Direct Memory Access (DMA) attacks... </p><p>DMA can allow attackers read and write access directly to your system's memory, bypassing the CPU and gaining kernel-level access 🖥️📁. </p><p>While often associated with physical access, these attacks can also be executed remotely, making them even more versatile and dangerous.<br> <br>Our interest in DMA attacks grew as we expanded our toolkit for rooting embedded devices. Many of these devices run Linux, which is often vulnerable by default. </p><p>Despite ongoing improvements in OS, firmware, and hardware protections, enterprise systems and cloud environments still face significant risks from these attacks.<br> <br>🛡️ Read our latest blog to learn how DMA attacks work and what steps you can take to safeguard your systems. 👉 <a href="https://www.pentestpartners.com/security-blog/direct-memory-access-dma-attacks-risks-techniques-and-mitigations-in-hardware-hacking/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pentestpartners.com/security-b</span><span class="invisible">log/direct-memory-access-dma-attacks-risks-techniques-and-mitigations-in-hardware-hacking/</span></a><br> <br><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/DMAAttacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DMAAttacks</span></a> <a href="https://infosec.exchange/tags/HardwareSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareSecurity</span></a> <a href="https://infosec.exchange/tags/DataSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataSecurity</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/TechSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechSecurity</span></a> <a href="https://infosec.exchange/tags/CyberThreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberThreats</span></a></p>
Purism<p>The Liberty Phone delivers uncompromising security for government mobile computing. <br><a href="https://puri.sm/posts/the-liberty-phone-secure-government-mobility/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">puri.sm/posts/the-liberty-phon</span><span class="invisible">e-secure-government-mobility/</span></a><br><a href="https://social.librem.one/tags/LibertyPhone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LibertyPhone</span></a> <a href="https://social.librem.one/tags/SecureGovMobile" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureGovMobile</span></a> <a href="https://social.librem.one/tags/MadeInUSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MadeInUSA</span></a> <a href="https://social.librem.one/tags/SupplyChainSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChainSecurity</span></a> <a href="https://social.librem.one/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://social.librem.one/tags/PureOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PureOS</span></a> <a href="https://social.librem.one/tags/EndToEndEncryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EndToEndEncryption</span></a> <a href="https://social.librem.one/tags/HardwareSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareSecurity</span></a> <a href="https://social.librem.one/tags/GOTSSolution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GOTSSolution</span></a> <a href="https://social.librem.one/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a></p>
Kyle 🕵️‍♂️💻<p>I don’t think my wife will allow this purchase. 😞</p><p><a href="https://allthingstech.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://allthingstech.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://allthingstech.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://allthingstech.social/tags/HardwareSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareSecurity</span></a> <a href="https://allthingstech.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://social.chiefgyk3d.com/@chiefgyk3d/112281594154555580" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">social.chiefgyk3d.com/@chiefgy</span><span class="invisible">k3d/112281594154555580</span></a></p>
ChiefGyk3D<p>I wish I could justify spending a few hundred on this device as it looks really cool to tinker with my security in my lab. </p><p><a href="https://www.crowdsupply.com/sutajio-kosagi/precursor" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">crowdsupply.com/sutajio-kosagi</span><span class="invisible">/precursor</span></a></p><p><a href="https://social.chiefgyk3d.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.chiefgyk3d.com/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://social.chiefgyk3d.com/tags/HardwareSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareSecurity</span></a> <a href="https://social.chiefgyk3d.com/tags/RISCV" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RISCV</span></a> <a href="https://social.chiefgyk3d.com/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a></p>
/dave/null 🥃💻<p>looking forward to <a href="https://chaos.social/tags/hardwearIO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hardwearIO</span></a> 2023 🎉🤭</p><p><a href="https://chaos.social/tags/hw_ioUSA2023" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hw_ioUSA2023</span></a> <a href="https://chaos.social/tags/hardwaresecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hardwaresecurity</span></a> <a href="https://chaos.social/tags/embedded" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>embedded</span></a></p>