The LIBRARY basement part 7

Hunting the Sigfox: Wireless IoT Network Security

Interesting extract from intro… “I show how a radio sniffer that has captured Sigfox messages can extract the uplink’s and downlink’s contents. While the uplink’s payload is already contained in plaintext, the downlink is scrambled, but I indicate how the downlink’s pseudorandom whitening sequence used for scrambling can be generated or brute-forced by an eavesdropper. Moreover, I outline attacks that could even compromise Sigfox’s authenticity checking.” :scream:

3 Likes

Swedish research multiplies the life of rechargeable NiMH batteries

3D printed custom-shaped batteries


crowdfunding

Room Escape Artist - a real hacker puzzle

lp%20node%20ch2i

3 Likes


:rofl: