Hackaday Links: September 29, 2024

Hackaday Links Column Banner

There was movement in the “AM Radio in Every Vehicle Act” last week, with the bill advancing out of the US House of Representatives Energy and Commerce Committee and heading …read more Continue reading Hackaday Links: September 29, 2024

Since JTAG can be authenticated and encrypted, which key is used? I read that Secure Boot is used, but what is the key?

Since JTAG can be authenticated and encrypted, which key is used? I read that Secure Boot is used, but what is the key? Me, owner of this laptop, how can I know the key to use to access my own laptop JTAG?

Continue reading Since JTAG can be authenticated and encrypted, which key is used? I read that Secure Boot is used, but what is the key?

What is a good alternative anti-theft tracker to Apple AirTags that don’t tip off thieves to their use in stolen items?

Apple AirTags are great in that they don’t come with a service subscription fee, but they sadly alert thieves who have Apple devices that the stolen item is being tracked giving the thief a chance to find and remove the tag. What is the ne… Continue reading What is a good alternative anti-theft tracker to Apple AirTags that don’t tip off thieves to their use in stolen items?

compatability of Desfire EV1/2 readers and cards with a Doorking access control system

I am getting the idea that Doorking’s ProxPlus cards and reader have a pre-defined encryption key in their reader. As these readers are wiegand devices and the software for the Doorking Access systems has no means of doing authentication o… Continue reading compatability of Desfire EV1/2 readers and cards with a Doorking access control system

Mitigating vulnerabilities in audio libraries that cause physical damage

As I pointed out here in February 2022, people who gained brief direct or remote access to a machine can change the volume step or other things regarding sudden large changes to the sound volume (for example via xbindkeys or shortcuts).
Th… Continue reading Mitigating vulnerabilities in audio libraries that cause physical damage

Does physical removal of all communicating modules on the motherboard ensure complete safety, assuming physical safety?

Say I have this computer that I bought and followed a manual to physically remove all communicating modules on its motherboard, including Wi-Fi adapter, Bluetooth adapter, etc. Assuming physical security i.e. no one can see my screen throu… Continue reading Does physical removal of all communicating modules on the motherboard ensure complete safety, assuming physical safety?