Carve has been researching security trends in the IoT space for the last two years. The results are sobering.
IPSEC locked the door? Use xt_TEE to inspect IPSEC traffic before encryption.
Have you ever found yourself wanting to patch an ARM binary to change a BL instruction? If so, read on!
Having a stand-alone “cyber policy” is not a replacement for sound technology risk management and operational best-practices.