Friday, August 16, 2024

Can you hack our new chip?

We think RP2350, our new high-performance, secure microcontroller, is pretty safe and sturdy. Care to test that theory? (We fully admit that everything is hackable given enough time and resources).

The image shows two RP2350 microcontrollers. The chip on the left features the Raspberry Pi logo, a stylised raspberry with a leaf. The chip is on a stylised sky blue background with what look like thin white cloud wisps darted through it.

Challenge Accepted!

Before we launched RP2350 and Raspberry Pi Pico 2, we wanted to do some testing on the security features of the chip and software, so we worked with some of the best names in the security testing game: Thomas Roth and Colin O’Flynn.

During this testing work, we figured we wanted to really push to see how well our security features held up to scrutiny and mischief; to do this, we partnered with Hextree.io to develop an RP2350 security hacking challenge. That challenge kicked off at DEF CON 32 last week and will run for 30 days. This challenge is open to anyone, not just DEF CON attendees.

This year’s kitty badges had an RP2350 bounty on their head

The challenge is simple: use these tools to set up your RP2350 into its standard secure mode, figure out how to hack it, and tell us the secret programmed into its OTP (one-time programmable memory). The first person to do so wins $10,000!

See here for the challenge details and the software to program your RP2350.

Glitch in the matrix.

Our friends at Hextree.io built a very cool RP2350 Security Playground board that gives the user straightforward access to glitch the voltage rails or clock input for the RP2350, with a nice GUI to set the chip into various modes ready to be meddled with!

You can use this hardware as part of our challenge, or for your own projects and testing. Click here to learn more.

Hextree’s RP2350 Security Playground board

The post Can you hack our new chip? appeared first on Raspberry Pi.



from News - Raspberry Pi https://ift.tt/hIMKTuY

Labels: ,

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home