tags:microcontrollerembeddedhardware_hacking original link: Accessory Authentication newsletter link: exploits.club Weekly Newsletter 18


Exploits Club Summary:

In this 3 part blog series, IOActive does a deep dive into the security processors on a consumer product vs an unlicensed clone. The goal of the series is to understand the similarities and differences between the two devices, and deduce how the clone is able to “extract the necessary IP to make a compatible solution”.