Einstein^Diogenes@UniverseLink<p>Bunnie Huang: The Hacktivist<br><a href="https://yewtu.be/watch?v=KyYsVeYzbik" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">yewtu.be/watch?v=KyYsVeYzbik</span><span class="invisible"></span></a></p><p><a href="https://betrusted.io" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">betrusted.io</span><span class="invisible"></span></a><br><a href="https://github.com/betrusted-io/betrusted-wiki/wiki" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/betrusted-io/betrus</span><span class="invisible">ted-wiki/wiki</span></a><br>Xous - <a href="https://defcon.social/tags/Rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rust</span></a> <a href="https://defcon.social/tags/Kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kernel</span></a> <a href="https://defcon.social/tags/RISC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RISC</span></a> <a href="https://defcon.social/tags/trust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>trust</span></a> <a href="https://defcon.social/tags/xous" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xous</span></a><br><a href="https://github.com/betrusted-io/xous-core" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/betrusted-io/xous-c</span><span class="invisible">ore</span></a></p><p>Precursor <br><a href="https://www.crowdsupply.com/sutajio-kosagi/precursor" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">crowdsupply.com/sutajio-kosagi</span><span class="invisible">/precursor</span></a><br>* Can’t trust browsers in the same device as you keep your crypto keys<br>* Evidence-based verification at multiple levels<br><a href="https://defcon.social/tags/mobile" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mobile</span></a> <a href="https://defcon.social/tags/trusted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>trusted</span></a> <a href="https://defcon.social/tags/Crypto_Wallet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Crypto_Wallet</span></a> <a href="https://defcon.social/tags/Encrypted_Messenger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Encrypted_Messenger</span></a> <a href="https://defcon.social/tags/Key_Distribution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Key_Distribution</span></a><br><a href="https://defcon.social/tags/ledger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ledger</span></a> <a href="https://defcon.social/tags/2FA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>2FA</span></a> <a href="https://defcon.social/tags/rustlang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rustlang</span></a></p><p><a href="https://bunnie.org/iris" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bunnie.org/iris</span><span class="invisible"></span></a><br>X-Ray All the Boards! <br>* hidden logic / malicious mystery components<br>* supply chain and distribution <a href="https://defcon.social/tags/interdiction" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>interdiction</span></a><br><a href="https://defcon.social/tags/radiography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>radiography</span></a> <a href="https://defcon.social/tags/IR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IR</span></a></p>