063 - I Read Online That It’s Impossible
An Interview With Thomas Roth/stacksmashing
26 Mar 2023
Jen and Alvaro chat with Thomas Roth (
@ghidraninja
on Twitter) about Airtag reverse engineering, debugging iPhones, and GameBoy RE! You can also find Thomas on his
stacksmashing.net
,
YouTube
, and
@stacksmashing@infosec.exchange
.
Here are some links to the topics we covered:
- stacksmashing youtube channel
- Linux on iPod
- Airtag fault injection twitter thread
- Bypassing code protection on NRF52
- Raspberry pi pico PIO
- Joe Grand wallet glitch video
- Wallet.fail
- Lennert’s Starlink terminal glitching DEFCON talk
- DEF CON 29 - Thomas Roth - Hacking the Apple AirTags
- How the Apple AirTags were hacked
- Hardwear.io NL 2021: Over The Air-Tag: Shenanigans With A Keyfinder by Jiska , Fabian And Thomas
- Kanzi Cable
- Bonobo Cable
- MFi
- IDBus and Lightning
- The Secrets of Apple Lightning - Part 1 (Video)
- The Hitchhacker’s Guide to iPhone Lightning and JTAG Hacking (DEF CON 30 Presentation)
- DCSD cable (lightning uart)
- Frida
- Saleae
- Openocd
- Tamarin Firmware Repo
- USB Cable Tester
- Picoprobe rpi2040 swd adapter
- Mario Kart AI training video
- Tetris movie
- Multiplayer tetris
- Webusb
- Online Multiplayer on the Game Boy (video)
- Gameshark
- Ghidra
- ChipSHOUTER-PicoEMP
- F$#k powerpoint there’s no power in the point
Have comments or suggestions for us? Find us on twitter @unnamed_show , or email us at show@unnamedre.com .
Music by TeknoAxe ( http://www.youtube.com/user/teknoaxe)