Blog
Latest posts
highlight shapeBreaking the console: a brief history of video game security
- Sergio Prado
- April 2, 2026
Video game security has always been a moving target, as consoles evolved to full-blown computing platforms locked down with layers of protection — but for every lock ever invented, there has always been someone determined to pick it.
Learn More detailsWhat are random numbers and how they are managed on Linux?
- Sergio Prado
- February 20, 2024
In this article, we will deep dive into the major concepts behind random numbers and learn how to work with them on a Linux system.
Learn More detailsDebugging the Linux kernel with GDB
- Sergio Prado
- January 17, 2024
In this article, we will learn how to debug the Linux kernel on an embedded Linux system with GDB.
Learn More detailsIntroduction to TPM (Trusted Platform Module)
- Sergio Prado
- October 11, 2023
TPM (Trusted Platform Module) is an international standard that enables trust in computing platforms in general, providing several security-related features for computer systems, including hashing, encryption, signing, random number generation, and many more!
Learn More detailsRPMB, a secret place inside the eMMC
- Sergio Prado
- June 13, 2023
Do you know there is a dedicated partition in the eMMC called RPMB that makes it possible to store data with integrity and authenticity support?
Learn More detailsIntroduction to SBOM management on embedded Linux
- Sergio Prado
- April 6, 2023
In this article, we will learn the basic concepts of SBOM (Software Bill of Materials) and how it can be generated and managed on embedded Linux with the Yocto Project.
Learn More details