Unnamed Reverse Engineering Podcast

063 - I Read Online That It’s Impossible

03.26.2023 - By Jen Costillo and Alvaro PrietoPlay

Download our free app to listen on your phone

Download on the App StoreGet it on Google Play

Jen and Alvaro chat with Thomas Roth (@ghidraninja on Twitter) about Airtag reverse engineering, debugging iPhones, and GameBoy RE! You can also find Thomas on his stacksmashing.net, YouTube, and @[email protected]. Here are some links to the topics we covered: stacksmashing youtube channel Linux on iPod Airtag fault injection twitter thread Bypassing code protection on NRF52 Raspberry pi pico PIO Joe Grand wallet glitch video Wallet.fail Lennert’s Starlink terminal glitching DEFCON talk DEF CON 29 - Thomas Roth - Hacking the Apple AirTags How the Apple AirTags were hacked  Hardwear.io NL 2021: Over The Air-Tag: Shenanigans With A Keyfinder by Jiska , Fabian And Thomas Kanzi Cable Bonobo Cable MFi IDBus and Lightning The Secrets of Apple Lightning - Part 1 (Video)  The Hitchhacker’s Guide to iPhone Lightning and JTAG Hacking (DEF CON 30 Presentation)  DCSD cable (lightning uart) Frida Saleae Openocd Tamarin Firmware Repo USB Cable Tester Picoprobe rpi2040 swd adapter Mario Kart AI training video Tetris movie Multiplayer tetris Webusb Online Multiplayer on the Game Boy (video) Gameshark Ghidra ChipSHOUTER-PicoEMP F$#k powerpoint there’s no power in the point Have comments or suggestions for us? Find us on twitter @unnamed_show,  or email us at [email protected]. Music by TeknoAxe (http://www.youtube.com/user/teknoaxe)

More episodes from Unnamed Reverse Engineering Podcast