In this article, we will deep dive into the major concepts behind random numbers and learn how to work with them on a Linux system.
[Read More]
Debugging the Linux kernel with GDB
In this article, we will learn how to debug the Linux kernel on an embedded Linux system with GDB.
[Read More]
Introduction to TPM (Trusted Platform Module)
TPM (Trusted Platform Module) is an international standard that enables trust in computing platforms in general, providing several security-related features for computer systems, including hashing, encryption, signing, random number generation, and many more!
[Read More]
RPMB, a secret place inside the eMMC
Do you know there is a dedicated partition in the eMMC called RPMB that makes it possible to store data with integrity and authenticity support?
[Read More]
Introduction to SBOM management on embedded Linux
In this article, we will learn the basic concepts of SBOM (Software Bill of Materials) and how it can be generated and managed on embedded Linux with the Yocto Project.
[Read More]
Asymmetric-Key Encryption and Digital Signatures in Practice
In this article, we will learn how asymmetric-key encryption and digital signatures work from a practical perspective.
[Read More]
A hands-on approach to symmetric-key encryption
In this article, we will learn how symmetric-key encryption works from a practical perspective.
[Read More]
Introduction to encryption for embedded Linux developers
This article is an introduction to encryption for embedded Linux developers.
[Read More]
What differs Android from other Linux based systems?
This article is an introduction to embedded Android from the perspective of an embedded Linux developer.
[Read More]
Introduction to Embedded Linux Security - part 2
This is the second part of the article about embedded Linux security.
[Read More]