In general terms does the use of ARM architecture pose any security benefits or risks over other architectures such as x86 and x64?

For example considering that ARM has TrustZone technology, and a potential reduced attack vector because it is based on a simpler RISC (Reduced Instruction Set Computing) based architecture instead of the CISC (Complex Instruction Set Comp… Continue reading In general terms does the use of ARM architecture pose any security benefits or risks over other architectures such as x86 and x64?

How to keep membership in sync in a multi tenant architecture with per tenant database?

I’m working on a project where we aim to have a separate database for each tenant. In our setup, there is a central database (and API) containing a "users" table that stores usernames and passwords for all users. Additionally, th… Continue reading How to keep membership in sync in a multi tenant architecture with per tenant database?

Is it safe to embed mTLS certificate and private key in IOT device’s executable?

I will be deploying IOT devices in a consumer’s network that authenticate with a web based API using mTLS. Is it safe to embed the certificate and private key in the IOT applications binary at compile time and distribute it like this? If t… Continue reading Is it safe to embed mTLS certificate and private key in IOT device’s executable?

Hackaday Links: June 18, 2023

Hackaday Links Column Banner

Will it or won’t it? That’s the question much on the minds of astronomers, astrophysicists, and the astro-adjacent this week as Betelgeuse continued its pattern of mysterious behavior that might …read more Continue reading Hackaday Links: June 18, 2023