Get the latest tech news
Aedan Cullen Cracks the Raspberry Pi RP2350's Security Subsystem Wide Open
Voltage-glitch attack, demonstrated at the 38C3 event, seems to be in with a shot at winning Raspberry Pi's $20,000 CTF contest.
It also includes a security subsystem that the company hopes will make it a tempting part for use in commercial designs where higher levels of protection is required — and to highlight the feature Raspberry Pi made it the subject of a $10,000 capture the flag competition, later raised to $20,000. In a presentation at the 38th Chaos Communications Congress, Cullen demonstrates what he claims to be an attack that unveils the protected secret at the heart of Raspberry Pi's capture the flag contest — which, if validated, will earn him the prize money. Cullen's presentation is available to stream and download on the CCC website and is embedded in full above; supporting source code and high-resolution annotated die shots of the RP2350 have been published to GitHub under the reciprocal GNU General Public License 3 and Creative Commons Attribution 4.0 respectively.
Or read this on Hacker News