Skip to main content

Questions tagged [security]

The tag has no usage guidance.

49 votes
4 answers
9k views

Why do fire and security systems run at 27.6 V?

I have been looking at buying power supply units for a project, and I keep seeing supplies that output 27.6 V. It's an unusually specific number, so what they are used for, and why is it important ...
Lucas's user avatar
  • 609
25 votes
5 answers
7k views

Why are SRAM based FPGA used more than NVM based FPGA?

SRAM based FPGAs need to load the bitstream again after power off. Meanwhile the Non-Volatile based one don't need that. I wonder, why are more experiments and security research done on the SRAM ...
Lavender's user avatar
  • 527
14 votes
5 answers
9k views

Is it possible to jam wireless home alarm systems?

Sorry if this is the wrong community for this question but in my mind, it's the best fit. Please close or move to a more appropriate community if it's off topic. The other day, several home alarm ...
Classified's user avatar
11 votes
8 answers
2k views

What is the ideal method of sensing whether 4 points on the bottom of a device are all depressed to indicate contact?

I am trying to place a sensor or switch on each corner of some desktop PCs so that if they are lifted an event is triggered like locking the computer or encrypting it. So far I have considered small ...
Diagram Alley's user avatar
11 votes
5 answers
2k views

Would an electric fence be able to detect being bypassed?

In the Flashpoint episode "The Farm," there's a scene where you can see one of the officers run a jumper cable from one contact on an electric fence to another, then cut the line of the fence (not ...
Der Kommissar's user avatar
10 votes
6 answers
3k views

A few questions on PIRs and other motion detectors

I grew up incorrectly believing that motion detectors (as part of burglar alarm systems) were designed to detect movement, when in actual fact it is the movement of a heated (like body heat) object ...
questioner's user avatar
7 votes
3 answers
3k views

securely storing and using keys in an embedded system

I'm using a microprocessor - PIC32MZ2048efm144 MCU that receives commands encrypted with a specific key, decrypts them and executes the command. The encrypted commands are stored offline, so I cannot ...
Sonja's user avatar
  • 77
7 votes
2 answers
3k views

Is there a way to prevent code being read from an MSP430 without blowing the fuse?

I was recently involved at a project in a small company where we had fears of someone taking the code from the master chip, an MSP430F2419, and using it for a competing product. We ended up blowing ...
Dom's user avatar
  • 349
6 votes
4 answers
1k views

How safe is this and should I change it?

I just finished building a project in my house to automate two plugs I installed on the top of my table, but due to laziness I left the ground connections outside the junction box like in the image: ...
DeadSec's user avatar
  • 377
6 votes
1 answer
380 views

Examples of DRM on embedded systems

I'm tasked with implementing a DRM on an embedded system. The device would have a limited number of times which it can run, after which it would be disabled, until it syncs with a computer with an ...
alexbb's user avatar
  • 309
5 votes
3 answers
2k views

ESP32 and security

I'm wondering how secured an ESP32 is. I'd like to use one to read data on a Telnet device which should remain in an offline network for security purposes. The ESP32 uses an Ethernet connection to ...
Manitoba's user avatar
  • 223
5 votes
1 answer
2k views

Is it possible to read erased flash memory?

In hard disks, a "quick format" does nothing to the actual data on the disk - just clears the FAT (file allocation table), which then appears as a "blank disk" to the user. Therefore, it is fairly ...
rdtsc's user avatar
  • 16.3k
5 votes
3 answers
455 views

Large exponentials and 8-bit PIC processors

Does anyone know if 8-bit (PIC) processors could typically handle large exponentials, e.g., 5^15 mod 23, with a reasonable speed? Does doing so result in more ...
Kar's user avatar
  • 1,557
5 votes
0 answers
3k views

How to save electronic equipment from ants? [closed]

Today I brought out my external HDD and it was full of red ants. It took me an hour to remove the ants (it seems quite impossible to remove all of them; some are still inside). I always see some ants ...
sakibmoon's user avatar
  • 265
4 votes
1 answer
101 views

How can I embed SmartCard/certificate challenge functionality in an embedded project?

I want to enable secure communication by embedding a certificate chip for a PKI in my embedded system so I can sign outgoing messages and make certificate challenges. I was expecting that there exist ...
Hauke Holtkamp's user avatar

15 30 50 per page
1
2 3 4 5
8