Friday 23 August 2013

Java Card programming: best practices

Read and remember. Very useful tips, especially about reducing memory consumption. A short summary of how the JCVM allocates memory is also given, including the amount of overhead per object.

Friday 16 August 2013

Saturday 3 August 2013

Hacking fingerprint USB drives

Excellent hack walkthrough and security analysis of two standard fingerprint-secured USB storage drives. The vendor reacted in a mature, proactive way to the news that their drives were hacked. That's not something you see very often... respect to USB-Secured.com.