Container technologies have been playing a significant role in the software development world since their inception with chroot.
Docker Containers
Posted on Feb 21, 2022 by Mykhaylo Sul
10 min read
Container technologies have been playing a significant role in the software development world since their inception with chroot.
Posted on Feb 20, 2022 by Jorge Ramirez Ortiz
10 min read
Linux microPlatform™ release v85 includes support for the OP-TEE upstream version of the NXP EdgeLock® SE05x integrating Plug-and-Trust revision 03.03.00.
FoundriesFactory
Posted on Feb 18, 2022 by Andy Doan
5 min read
Integrating with AWS IoT Core sounds easy at first. However, making it work for a fleet of devices turns out to be a complicated task of navigating many sources of information.. .
IoT Security, nxp
Posted on Feb 7, 2022 by Jorge Ramirez Ortiz
7 min read
Linux microPlatform™ release v85 includes support for the OP-TEE upstream version of the NXP EdgeLock® SE05x integrating Plug-and-Trust revision 03.03.00.
Posted on Feb 2, 2022 by Daiane Angolini
6 min read
Introduction The secure Linux platform, provided by Foundries.io is leveraged by several layers of signed binaries which are verified during boot time.
FoundriesFactory
Posted on Jan 5, 2022 by Milosz Wasilewski
5 min read
Testing a customizable operating system is a tricky business. It is even harder when the features are determined by the hardware the OS is running on .
FoundriesFactory
Posted on Oct 19, 2021 by Andy Doan
5 min read
This blog will be my most controversial yet; It covers two lightning rod issues - developer workflows and Little League Baseball.
FoundriesFactory
Posted on Oct 5, 2021 by Andy Doan
2 min read
On September 30, Let's Encrypt's original root certificate expired. All of our customer-facing HTTPS services have certificates signed by Let's Encrypt .
IoT Security
Posted on Aug 12, 2021 by Andy Doan
4 min read
This is the final article in my PKI Hacking for Fun and Profit series.
IoT Security
Posted on Jul 30, 2021 by Andy Doan
3 min read
Following the PKI Hacking for Fun and Profit article, I've created a simple example of an event logging agent that allows devices to use a customer owned mTLS server.