IoT Blog Written By Experts For Experts

The Foundries.io Blog

IoT Security

NXP EdgeLock® SE05x: Accessing a Secure Element from a Trusted Execution Environment

Linux microPlatform™ release v85 includes support for the OP-TEE upstream version of the NXP EdgeLock® SE05x integrating Plug-and-Trust revision 03.03.00.

Read more →

FoundriesFactory

Changes from Honister that impact a FoundriesFactory

The Yocto Project has made critical changes in the Honister release (3.4). This post details two changes that impact a FoundriesFactory: Override syntax Directory structure for tune files. A future LmP version will be released based on Honister. These changes do not impact the current version (v85). By knowing what to expect in future LmP versions, plans can be made to ease the transition.

Read more →

Blog category image
Docker Containers

Bringing Docker containers to IoT & Edge devices: Part 1, Restorable Compose Apps

Container technologies have been playing a significant role in the software development world since their inception with chroot. Thanks to Docker, containers have become the de facto standard for packaging, distribution, deployment, and running of cloud applications. You know they say "Build, Ship, and Run Any App, Anywhere". The question is, though, is this Anywhere really anywhere? In particular, can we "Build, Ship and Run Any App, on Any IoT & Edge Devices" or at least Some Apps on Some IoT & Edge Devices? Let's think about whether Containers can be applied to IoT & Edge software development too, whether it's feasible at all, and if yes, what benefits it brings. And last but not least, what challenges in adaptation of Containers to the Edge use-case there are.

Read more
Blog category image
IoT Security

NXP EdgeLock® SE05x execution on TEE: enabling the GP Secure Channel Protocol 03

Linux microPlatform™ release v85 includes support for the OP-TEE upstream version of the NXP EdgeLock® SE05x integrating Plug-and-Trust revision 03.03.00.

Read more
Blog category image
FoundriesFactory

Integrating with AWS IoT using Just-in-Time Provisioning

Integrating with AWS IoT Core sounds easy at first. However, making it work for a fleet of devices turns out to be a complicated task of navigating many sources of information... this week I found clarity.

Read more
Blog category image
IoT Security

NXP EdgeLock® SE05x: Accessing a Secure Element from a Trusted Execution Environment

Linux microPlatform™ release v85 includes support for the OP-TEE upstream version of the NXP EdgeLock® SE05x integrating Plug-and-Trust revision 03.03.00.

Read more
Blog category image
IoT Security

How to read the boot logs to check the used keys

Introduction The secure platform, provided by Foundries.io is leveraged by several layers of signed binaries which are verified during boot time. Some layers use proprietary source code (such as the secure boot on some architectures) and other layers are part of well known open source projects (such as U-Boot and Linux Kernel). This article details how to read the available log and artifacts from a booting machine, in order to detect the verification mechanism executed during a normal boot.

Read more
Blog category image
FoundriesFactory

Testing software at Foundries.io (part 1)

Testing a customizable operating system is a tricky business. It is even harder when the features are determined by the hardware the OS is running on. Foundries.io delivers a product that needs to work on every platform we support.

Read more
Blog category image
FoundriesFactory

Working with containers on embedded devices

This blog will be my most controversial yet; It covers two lightning rod issues - developer workflows and Little League Baseball. Hold on tight and you may learn some tricks for developing containers more efficiently.

Read more
Blog category image
FoundriesFactory

The Let's Encrypt Update

On September 30, Let's Encrypt's original root certificate expired. All of our customer-facing HTTPS services have certificates signed by Let's Encrypt. As can be expected, there were a few hiccups along the way. If you are experiencing issues with services on Foundries.io please take a look below and see if this corrects your issue. If this does not resolve your issue do not hesitate to reach out to our support team either on Slack or via our support portal.

Read more
Blog category image
IoT Security

PKI Hacking for Fun and Profit - Part III

This is the final article in my PKI Hacking for Fun and Profit series. This article follows up on part II and shows how you can use AWS's API Gateway to handle mTLS traffic from your factory devices with AWS Lambda. The result is a service that can scale as you need. In the PKI Hacking for Fun and Profit - Part II article, I created a simple example of an event logging agent that allows devices to use a customer owned mTLS server.

Read more
Blog category image
IoT Security

PKI Hacking for Fun and Profit - Part II

Following the PKI Hacking for Fun and Profit article, I've created a simple example of an event logging agent that allows devices to use a customer owned mTLS server.

Read more

Keep up to date with Foundries.io