Can you hack our new chip?
We think RP2350, our new high-performance, secure microcontroller, is pretty safe and sturdy. Care to test that theory? (We fully admit that everything is hackable given enough time and resources).

Challenge Accepted!
Before we launched RP2350 and Raspberry Pi Pico 2, we wanted to do some testing on the security features of the chip and software, so we worked with some of the best names in the security testing game: Thomas Roth and Colin O’Flynn.
During this testing work, we figured we wanted to really push to see how well our security features held up to scrutiny and mischief; to do this, we partnered with Hextree.io to develop an RP2350 security hacking challenge. That challenge kicked off at DEF CON 32 last week and will run for 30 days. This challenge is open to anyone, not just DEF CON attendees.
The challenge is simple: use these tools to set up your RP2350 into its standard secure mode, figure out how to hack it, and tell us the secret programmed into its OTP (one-time programmable memory). The first person to do so wins $10,000!
See here for the challenge details and the software to program your RP2350.
Glitch in the matrix.
Our friends at Hextree.io built a very cool RP2350 Security Playground board that gives the user straightforward access to glitch the voltage rails or clock input for the RP2350, with a nice GUI to set the chip into various modes ready to be meddled with!
You can use this hardware as part of our challenge, or for your own projects and testing. Click here to learn more.
The post Can you hack our new chip? appeared first on Raspberry Pi.
from News - Raspberry Pi https://ift.tt/hIMKTuY
Labels: IFTTT, News - Raspberry Pi

0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home