Questions tagged [security]
The security tag has no usage guidance.
112
questions
49
votes
4
answers
9k
views
Why do fire and security systems run at 27.6 V?
I have been looking at buying power supply units for a project, and I keep seeing supplies that output 27.6 V. It's an unusually specific number, so what they are used for, and why is it important ...
25
votes
5
answers
7k
views
Why are SRAM based FPGA used more than NVM based FPGA?
SRAM based FPGAs need to load the bitstream again after power off. Meanwhile the Non-Volatile based one don't need that.
I wonder, why are more experiments and security research done on the SRAM ...
14
votes
5
answers
9k
views
Is it possible to jam wireless home alarm systems?
Sorry if this is the wrong community for this question but in my mind, it's the best fit. Please close or move to a more appropriate community if it's off topic.
The other day, several home alarm ...
11
votes
8
answers
2k
views
What is the ideal method of sensing whether 4 points on the bottom of a device are all depressed to indicate contact?
I am trying to place a sensor or switch on each corner of some desktop PCs so that if they are lifted an event is triggered like locking the computer or encrypting it.
So far I have considered small ...
11
votes
5
answers
2k
views
Would an electric fence be able to detect being bypassed?
In the Flashpoint episode "The Farm," there's a scene where you can see one of the officers run a jumper cable from one contact on an electric fence to another, then cut the line of the fence (not ...
10
votes
6
answers
3k
views
A few questions on PIRs and other motion detectors
I grew up incorrectly believing that motion detectors (as part of burglar alarm systems) were designed to detect movement, when in actual fact it is the movement of a heated (like body heat) object ...
7
votes
3
answers
3k
views
securely storing and using keys in an embedded system
I'm using a microprocessor - PIC32MZ2048efm144 MCU that receives commands encrypted with a specific key, decrypts them and executes the command.
The encrypted commands are stored offline, so I cannot ...
7
votes
2
answers
3k
views
Is there a way to prevent code being read from an MSP430 without blowing the fuse?
I was recently involved at a project in a small company where we had fears of someone taking the code from the master chip, an MSP430F2419, and using it for a competing product. We ended up blowing ...
6
votes
4
answers
1k
views
How safe is this and should I change it?
I just finished building a project in my house to automate two plugs I installed on the top of my table, but due to laziness I left the ground connections outside the junction box like in the image:
...
6
votes
1
answer
380
views
Examples of DRM on embedded systems
I'm tasked with implementing a DRM on an embedded system. The device would have a limited number of times which it can run, after which it would be disabled, until it syncs with a computer with an ...
5
votes
3
answers
2k
views
ESP32 and security
I'm wondering how secured an ESP32 is.
I'd like to use one to read data on a Telnet device which should remain in an offline network for security purposes.
The ESP32 uses an Ethernet connection to ...
5
votes
1
answer
2k
views
Is it possible to read erased flash memory?
In hard disks, a "quick format" does nothing to the actual data on the disk - just clears the FAT (file allocation table), which then appears as a "blank disk" to the user. Therefore, it is fairly ...
5
votes
3
answers
455
views
Large exponentials and 8-bit PIC processors
Does anyone know if 8-bit (PIC) processors could typically handle large exponentials, e.g., 5^15 mod 23, with a reasonable speed? Does doing so result in more ...
5
votes
0
answers
3k
views
How to save electronic equipment from ants? [closed]
Today I brought out my external HDD and it was full of red ants. It took me an hour to remove the ants (it seems quite impossible to remove all of them; some are still inside). I always see some ants ...
4
votes
1
answer
101
views
How can I embed SmartCard/certificate challenge functionality in an embedded project?
I want to enable secure communication by embedding a certificate chip for a PKI in my embedded system so I can sign outgoing messages and make certificate challenges. I was expecting that there exist ...