Skip to main content

Questions tagged [security]

The tag has no usage guidance.

0 votes
0 answers
136 views

How can a designer be sure to authorize only legit ICs? How is performed? How are cloned ICs prevented to be activated?

The above diagram is from the IC Activation (locking/unlocking) slide of Fighting against theft, cloning and counterfeiting of integrated circuits by Lilian Bossuet Associate Professor, CNRS Chaire of ...
allexj's user avatar
  • 55
1 vote
3 answers
134 views

Switch ELECTRICALLY SAFE between 3 resistive loads (16 A each) on a 16 A line

How to switch 3 resistive consumers (heaters), each having a current consumption of nearly 16 A alternate & ELECTRICALLY SAFELY (German standards)? So that only one of them heats at a time and the ...
Lux's user avatar
  • 111
0 votes
0 answers
35 views

BLE relay to control my garage door - security concerns

I would like to use Shelly 1PM Mini Gen3 to control my garage door. Since I do not have WiFi coverage in my garage I will rely on Bluetooth. However with this setup I am not sure if this Smart home ...
sidlo's user avatar
  • 101
3 votes
3 answers
2k views

How can I make an alarm circuit which senses both cutting and shorting the wire?

I have searched Google top to bottom the only circuit which fullfills my requirements is a wire break or wire loop security alarm as shown in figure 1. I soon realised that if the robber shorts the ...
Mark 's user avatar
  • 39
5 votes
3 answers
2k views

ESP32 and security

I'm wondering how secured an ESP32 is. I'd like to use one to read data on a Telnet device which should remain in an offline network for security purposes. The ESP32 uses an Ethernet connection to ...
Manitoba's user avatar
  • 223
0 votes
1 answer
101 views

Is there a (legal) wireless transmission solution for my underground parkade anti-theft alarm?

I live on the 4th floor of a low-rise condo building with a concrete parkade beneath. We have a serious problem with bicycle theft -- someone is coming in late at night with an angle grinder, and ...
Matt's user avatar
  • 3
0 votes
2 answers
54 views

Best way to use Driveay alert output (Open Collector NPN)

I'm learning as I go on this project. I have a beam-break driveway alert that I would like to get the output from on a device like an Arduino or Raspberry Pi and need some guidance on the best ...
sdg's user avatar
  • 1
0 votes
0 answers
62 views

how to determine what chip wire allows BIOS flashing?

how to determine what chip wire/leg allows BIOS flashing? I want to modify my MOBO to deny BIOS flashing. I only want it allowed when I really need to write on it. So, I need to know: if it is ...
VeganEye's user avatar
0 votes
0 answers
63 views

How safe is it to plug a resistor on a 12 V transformer?

I was thinking about using an old fridge as a seedling cabinet. I am tempted to use the resistor of an out of order pizza oven plugged on a small 12 V transformer to heat the cabinet. I didn't do the ...
Skippy le Grand Gourou's user avatar
1 vote
1 answer
164 views

Securing PCB from illegal redistribution [closed]

I'm wondering if there is a state of the art method for securing a PCB with a microcontroller against copy and illegal distribution. For example the well known the flight controller SP racing F3 had ...
Yann's user avatar
  • 81
6 votes
4 answers
1k views

How safe is this and should I change it?

I just finished building a project in my house to automate two plugs I installed on the top of my table, but due to laziness I left the ground connections outside the junction box like in the image: ...
DeadSec's user avatar
  • 377
-4 votes
1 answer
166 views

In this circuit, the light intensity sensor (LDR) only senses 3_2 cm. How can I improve the sensitivity of this sensor to reach 1m?

In this circuit, the light intensity sensor (LDR) only senses 3_2 cm. How can I improve the sensitivity of this sensor to reach 1m? https://ibb.co/c3X1NRS
Forkan Xa's user avatar
0 votes
1 answer
480 views

Circuit board inside a charging cable

I am looking for help identifying a circuit board found inside one of the ends of a charging cable that mysteriously showed up on the desk in my home office. The board has the following stamped on it: ...
Justin Quiring's user avatar
11 votes
8 answers
2k views

What is the ideal method of sensing whether 4 points on the bottom of a device are all depressed to indicate contact?

I am trying to place a sensor or switch on each corner of some desktop PCs so that if they are lifted an event is triggered like locking the computer or encrypting it. So far I have considered small ...
Diagram Alley's user avatar
1 vote
0 answers
54 views

Has any implementation succeeded to have shared key inside chipset and protect it from exploits?

Since there is a lot of demonstration like using SEM (Scanning Electron Microscope) to read bits from ROM through the scanned image of chipset, is there any implementation that has managed to succeed ...
hurryman2212's user avatar
0 votes
0 answers
46 views

How to add more lights and sirens to motion detector

I have a motion detector size of a cigarette box that rings bell or simple song when activated using a small remote control. We turn it on after closing the business to go home. We've had many ...
McJoo's user avatar
  • 1
0 votes
1 answer
86 views

Breaker with alarm

I am thinking about a theft alarm for an HVAC condenser. The condenser is installed outside and subject to burglary. I think a viable approach is detecting when it is detached from power. The HVAC ...
Mehhey's user avatar
  • 1
1 vote
2 answers
133 views

Pin-based security chips for Arduino?

These cryptocurrency wallets like Coldcard can be unlocked by a simple PIN, and are fairly safe. I believe that they use a security chip that stores information and only delivers with the right PIN. ...
Guerlando OCs's user avatar
3 votes
3 answers
2k views

How do I protect the power supply from a short circuit inside a device?

I'm working on an electronics project which would be powered by a 12V power adapter. I'm worried that in a case of a short circuit inside the device I'm making, the adapter could catch fire. Every ...
Arseni Mourzenko's user avatar
2 votes
1 answer
348 views

Security device for camera sensor?

I am currently designing a raspberry pi interface board and while I was looking at the documentation for MIPI CSI camera ports I bumped into this sentence: Camera sensors supported by the official ...
nowox's user avatar
  • 847
0 votes
1 answer
49 views

LS7220 passcode IC

I bought the LS7220 IC which is designed to check passcodes. For some reason, the pin 8 Lock Status Output does not illuminate the LED when I connect the power, and when I bridge the VCC in sequence ...
questioner's user avatar
0 votes
0 answers
41 views

LS7220 IC question for HIGH and LOW

I am learning about the basics of electronics. I bought an LS7220 chip for a keypad lock, but using it turned out more difficult than I expected. I have attached it to a 9v battery at pins 9 and 14, ...
questioner's user avatar
10 votes
6 answers
3k views

A few questions on PIRs and other motion detectors

I grew up incorrectly believing that motion detectors (as part of burglar alarm systems) were designed to detect movement, when in actual fact it is the movement of a heated (like body heat) object ...
questioner's user avatar
0 votes
0 answers
80 views

Why does Intel's CCA (USB3 JTAG control scheme) not let a remote attacker own any system with a flash drive plugged in?

JTAG lets us read / write the architecture states on a CPU core. Intel's CCA let's us connect to JTAG with a USB3 port. So why could an attacker not execute code to trick a flash drive plugged into a ...
J.Todd's user avatar
  • 223
49 votes
4 answers
9k views

Why do fire and security systems run at 27.6 V?

I have been looking at buying power supply units for a project, and I keep seeing supplies that output 27.6 V. It's an unusually specific number, so what they are used for, and why is it important ...
Lucas's user avatar
  • 609
3 votes
4 answers
2k views

Reverse engineer this old burglar alarm panel

I took apart an old magnetic door alarm, where when the contact is broken it counts down from 10 seconds for the user to input the code (which ranges from 1 to 8, there is no 0 or 9 key). This alarm ...
questioner's user avatar
1 vote
1 answer
489 views

GFCI outlet vs centralized differential circuit breakers

In North America, I'm told GFCI outlets have become common. They have an individual differential circuit breaker built-in. In the European Community, differential circuit breaker are (mandatorily) ...
fgrieu's user avatar
  • 1,670
2 votes
0 answers
264 views

Randomize PCB trace generation with Altium Designer

We are trying to create a tamper mesh as a flex PCB. This tamper mesh will consist of around 10 signal traces in order to detect a tamper. One crucial point is that this tamper mesh should be ...
Maurice Pannard's user avatar
2 votes
3 answers
558 views

SRM32H743 signed DFU updates

I want to implement signed software updates to my MCU. It is connected via USB and I am using the USB DFU to upload a firmware to it. I want only signed firmware to be allowed to be uploaded to the ...
Uriel Katz's user avatar
3 votes
3 answers
335 views

how to make an obfuscated network cable

(EDIT): forest for the trees This is why I love StackExchange! I have several great ideas to try, none of which were my original. I asked here based on an assumption I probably shouldn't make: my ...
zedmelon's user avatar
  • 131
0 votes
0 answers
71 views

Detection range of unintentional emissions by battery powered video recording devices?

I have read about unintentional radiators, but wonder about what their unwanted emissions detection range can be in low background noise, referring to battery powered motion-sensor activated video ...
yifos's user avatar
  • 11
0 votes
2 answers
157 views

Why does a slightly out of specs power supply works and what are the possible consequences? [closed]

I have the following lamp: Its power supply is rated at 5.6V and 2.68A blew up some time ago. I then went to an electronics shop where I've been suggested that I could replace it by a universal power ...
aybe's user avatar
  • 125
0 votes
1 answer
134 views

Thunderstorm reseting my micro-controller

I think this is a follow up from my previous question. If not then please ignore it. I have created a very basic (crude) alarm system that uses a reed switch. Luckily there was a thunderstorm and some ...
JoeyB's user avatar
  • 2,391
-1 votes
1 answer
39 views

Can a USB key data be erased by a upsurge in the voltage?

Say I want to design a USB key that would hold personal information. And I want to have a kill switch that would make the NAND memories just destroy or change status instantly by an upsurge of voltage....
Francisco Laferrière's user avatar
2 votes
2 answers
3k views

Building a simple microphone jammer

A microphone jammer is a device that broadcasts ultrasound waves and, due to the non-linearity of mic amplifiers in small gadgets (i.e. smartphones) it overwhelms the microphone so the only sound the ...
user avatar
0 votes
1 answer
636 views

Simple security Alarm incorrect schematic diagram

I am a student and my Applied Physics teacher gave an assignment to create a schematic diagram of a security alarm. The main Components are, Switch (Simple on/off) SCR C106B (Silicon Controlled ...
Usman's user avatar
  • 3
0 votes
1 answer
141 views

electric bedroom heated mattress vs danger

We have one 220v electric bedroom heated mattress which repaired by ordinary repairman and changed its board, the circuit is this kind: And the burned spot in the Blanket: Its used some resistor and ...
xinani7057_tgres24.com's user avatar
1 vote
2 answers
803 views

How do I implement authentication on an embedded device? [closed]

I have been reading a lot about encryption lately but most sources just care about making sure that the connection between two parties is secure. I want to know how I can be sure that the party I am ...
Vincent Kenbeek's user avatar
0 votes
0 answers
52 views

Problem with understanding the circuit related to stable matching security

I am trying to understand a circuit used for stable matching. The paper title is: MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation and is available : here I am attaching the ...
user2994783's user avatar
2 votes
1 answer
104 views

Hardware Secure Elements

After checking multiple suppliers and reading about HW secure elements, I would like to understand the use of this type of electronic components. Maybe I´m wrong, but it seems a HW secure element ...
LazyTurtle's user avatar
1 vote
1 answer
136 views

Strategy against Side Channel Attack

I am newbie to Hardware Security. While studying Side Channel Attack, I realized that power consumption profile of electronic control unit is a key to encrypt what algorithm runs on it. I thought ...
emre iris's user avatar
  • 127
1 vote
2 answers
872 views

Secure storage of Data in external EEPROM

I am working in designing of a prepaid energy meter. One of the most things I should store are (private key, credit and cumulative energy). The private key is stored only once. The credit and ...
Ashraf Almubarak's user avatar
0 votes
1 answer
83 views

Protection against a circuit being closed too long or failing closed

I'm prototyping a device that allows me to electronically open my front door, which it accomplishes by using a relay to close an existing circuit in my house. All I know about this circuit is that it ...
Bart van Heukelom's user avatar
1 vote
1 answer
55 views

Side-channel leakage and instruction types on microcontrollers

Since the end of 90s, it is known that side-channels (e.g. execution time, power consumption, electromagnetic emanations) of computation platforms can be analysed to recover information on data being ...
Raoul722's user avatar
  • 113
0 votes
1 answer
97 views

Can an Integrated Circuit ROM ever be secured [closed]

This presentation which includes embedding public asymmetric crypto assets in a micro-controller on chip ROM suggests that there are, but I am sceptical. Is it the case that there is nothing that can ...
LogicError's user avatar
0 votes
2 answers
6k views

What is the purpose of a mains X2 Security Capacitor and how to determine its value?

simulate this circuit – Schematic created using CircuitLab I am evolving an existing circuit which has a 230VAC input. The 230VAC has multiple loads: Transformer followed by rectifing circuit; ...
le_top's user avatar
  • 3,221
1 vote
1 answer
99 views

What receiver is appropriate for studying compromising emanations in 2019?

I'm currently reading the Cambridge Technical Report Number 577, Compromising emanations: eavesdropping risks of computer displays, by Markus G. Kuhn and published in Dec 2003. In the paper, Kuhn uses ...
BLUC's user avatar
  • 113
2 votes
3 answers
1k views

How to prevent someone clone PIC [closed]

ACT 1 Okay I know there is code protection system on PIC. But it is preventing someone read the code, not copy. It looks still easy to clone and run on another circuit. Can you suggest another ...
Eren's user avatar
  • 21
1 vote
2 answers
142 views

Is POR Secure Memory/peripherals on ARM common in real hardware just a feature of QEMU?

I've been implementing firmware for an ARMv8 processor recently and have been studying open-source tools along the way. I looked into the ARM virtual model in QEMU and came across something it refers ...
sherrellbc's user avatar
  • 3,461
0 votes
1 answer
4k views

Modify Ring Contact Sensor in a series of wired security reed switches

After reading the instructables post on the simplisafe sensor I modified the ring sensor and tried to integrate it with my wired sensors. This is what I found: testing with a spooled wire about 20 ...
lcpr's user avatar
  • 1

15 30 50 per page