Integrating with AWS IoT Core sounds easy at first. However, making it work for a fleet of devices turns out to be a complicated task of navigating many sources of information.. .
FoundriesFactory

Posted on Feb 18, 2022 by Andy Doan
5 min read
Integrating with AWS IoT Core sounds easy at first. However, making it work for a fleet of devices turns out to be a complicated task of navigating many sources of information.. .
IoT Security, nxp

Posted on Feb 7, 2022 by Jorge Ramirez Ortiz
7 min read
Linux microPlatform™ release v85 includes support for the OP-TEE upstream version of the NXP EdgeLock® SE05x integrating Plug-and-Trust revision 03.03.00.

Posted on Feb 2, 2022 by Daiane Angolini
6 min read
Introduction The secure Linux platform, provided by Foundries.io is leveraged by several layers of signed binaries which are verified during boot time.
FoundriesFactory

Posted on Jan 5, 2022 by Milosz Wasilewski
5 min read
Testing a customizable operating system is a tricky business. It is even harder when the features are determined by the hardware the OS is running on .
FoundriesFactory

Posted on Oct 19, 2021 by Andy Doan
5 min read
This blog will be my most controversial yet; It covers two lightning rod issues - developer workflows and Little League Baseball.
FoundriesFactory

Posted on Oct 5, 2021 by Andy Doan
2 min read
On September 30, Let's Encrypt's original root certificate expired. All of our customer-facing HTTPS services have certificates signed by Let's Encrypt .
IoT Security

Posted on Aug 12, 2021 by Andy Doan
4 min read
This is the final article in my PKI Hacking for Fun and Profit series.
IoT Security

Posted on Jul 30, 2021 by Andy Doan
3 min read
Following the PKI Hacking for Fun and Profit article, I've created a simple example of an event logging agent that allows devices to use a customer owned mTLS server.
IoT Security, xilinx

Posted on Jul 28, 2021 by Jorge Ramirez Ortiz
3 min read
Lmp release v83 includes support for secure boot authentication on the Xilinx Zynq® UltraScale+™ MPSoC family of products.
IoT Security

Posted on Jul 27, 2021 by Andy Doan
4 min read
Products often need to talk to third party services like AWS. Many times, the best bad option available is to copy some type of API key to the device's file system .