Hacking Tomu and 2FA

From 33C3_Public_Wiki
Revision as of 16:16, 29 December 2016 by Riat (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
Description We are working on the Tomu devices and will discuss current issues and todos for future development, such as bootloader optimization and implementing different 2FA (2-Factor-Authentication) methods for use with the device. We will look at existing code and implementations of 2FA and we will work on implementations.
Website(s) http://tomu.im
Type Hands-On
Kids session No
Keyword(s) hardware, software, embedded, security
Tags open hardware, arm, 2fa
Processing assembly RIAT Crypto Lab
Person organizing Mithro
Language en - English
en - English
Related to Tomu
Other sessions...

refresh

Starts at 2016/12/30 14:00
Ends at TBD
Duration TBD
Location RIAT Crypto Lab

We are working on the Tomu devices and will discuss current issues and todos for future development, such as bootloader optimization and implementing different 2FA (2-Factor-Authentication) methods for use with the device. We will look at existing code and implementations of 2FA and we will work on implementations.

I'm Tomu

I'm Tomu a tiny ARM microprocessor which fits in your USB port. I have two buttons and two LEDs!

I'm fully open source, have a BOM of ~$10 (in individual quantities) and am constructable by hobbyists! Designed for 2-factor authentication or anything else you can think of.

Lots more details in Mithro's 33C3 Lightning Talk on Tomu.

Tomu Prototype Running Blinky Firmware