Atomic Central
Atomic Central
  • 75
  • 17 874
MCH2022: Introduction to MQTT Node RED Tasmota
Source: media.ccc.de/v/mch2022-32-introduction-to-mqtt-node-red-tasmota
---------------
Introduction to MQTT, Node-RED & Tasmota
A demonstration of the power of MQTT in combination with Node-RED. We'll also take a look at the "universal" Tasmota firmware for ESP8266 and ESP32-based devices. This all to hopefully make you enthusiastic to start building your own projects with these building blocks.
A demonstration of the power of MQTT in combination with Node-RED. We'll also take a look at the "universal" Tasmota firmware for ESP8266 and ESP32-based devices. This all to hopefully make you enthusiastic to start building your own projects with these building blocks.
MQTT is a very light message transport mechanism that uses a standard network connection and a subscribe-publish
protocol to get messages from one device to one or more others in the network in a structured manner.
Node-RED is a programming tool for wiring together hardware devices, APIs and online services very suited for working with MQTT messages.
Tasmota started as a universal firmware for ESP8266/8285 IoT-devices, now with added support for the ESP32 and it comes with MQTT-support out of the box.
With these tools, a raspberry pi and a few lines of script, we can start building home automation or whatever you want.
---------
No Copyright claimed.
Переглядів: 83

Відео

MCH2022: Cryptography is easy but no magic Use it Wisely
Переглядів 34521 день тому
Source: media.ccc.de/v/mch2022-231-0-cryptography-is-easy-but-no-magic-use-it-wisely Using cryptography can give you easy assurances, keep data confidential and keep prying eyes from stuff where they should not be. However it's not magic. This talk is intended for programmers, users and software designers. This talk is about hardcore mathematics while you should not have to understand what the ...
38c3: ACE up the sleeve Hacking into Apples new USB C Controller
Переглядів 3,8 тис.21 день тому
Source: media.ccc.de/v/38c3-demystifying-common-microcontroller-debug-protocols Demystifying Common Microcontroller Debug Protocols Many developers know that the answer to "How do I debug this microcontroller" is either "JTAG" or "SWD". But what does that mean, exactly? How do you get from "Wiggling wires" to "Programming a chip" and "Halting on breakpoints"? This talk will cover how common deb...
38c3 Demystifying Common Microcontroller Debug Protocols
Переглядів 2,8 тис.21 день тому
Source: media.ccc.de/v/38c3-demystifying-common-microcontroller-debug-protocols Demystifying Common Microcontroller Debug Protocols Many developers know that the answer to "How do I debug this microcontroller" is either "JTAG" or "SWD". But what does that mean, exactly? How do you get from "Wiggling wires" to "Programming a chip" and "Halting on breakpoints"? This talk will cover how common deb...
38C3: Hacking the RP2350
Переглядів 10 тис.21 день тому
Source: media.ccc.de/v/38c3-hacking-the-rp2350 Chaos Communication Congress (38C3) More info: www.tomshardware.com/raspberry-pi/it-looks-like-the-raspberry-pi-rp2350-hacking-challenge-has-been-beaten-hacker-gains-access-to-the-otp-secret-by-glitching-the-risc-v-cores-to-enable-debugging Raspberry Pi's RP2350 microcontroller introduced a multitude of new hardware security features over the RP204...
TF-M: Introduction to SPRTL (Secure Partition Runtime Library)
Переглядів 17Місяць тому
Introduction to SPRTL (Secure Partition Runtime Library) PDF Presentation: www.trustedfirmware.org/docs/Secure-Partition-Runtime-Library-Update.pdf Date - 9th July 2020
TF-M: PSA-FF-M_v11-SecureFunctions
Переглядів 3Місяць тому
PSA-FF-M_v11-SecureFunctions PDF Presentation: www.trustedfirmware.org/docs/PSA-FF-M_v11-SecureFunctions.pdf Date - 25th June 2020
TF-M Build System Update
Переглядів 1Місяць тому
TF-M Build System Update PDF Presentation: www.trustedfirmware.org/docs/TF-M_Build_system_update.pdf Date - 11th June 2020
TF-M: Hardware Abstraction Layer
Переглядів 10Місяць тому
Hardware Abstraction Layer PDF Presentation: www.trustedfirmware.org/docs/TF-M_HAL_Introduction.pdf Date - 28th May 2020
TF-M: Roadmap to PSA-FF-M v1.1
Переглядів 4Місяць тому
Roadmap to PSA-FF-M v1.1 PDF Presentation: www.trustedfirmware.org/docs/Roadmap_to_PSA-FF-M_v1_1.pdf Date - 14th May 2020
TF-M: Handle Management Mechanism Enhancement
Переглядів 1Місяць тому
Handle Management Mechanism Enhancement PDF Presentation: www.trustedfirmware.org/docs/Handle_Management_Mechanism_Enhancement.pdf Date - 30th April 2020
TF-M: Symmetric key based device attestation
Переглядів 17Місяць тому
Symmetric key based device attestation PDF Presentation: www.trustedfirmware.org/docs/Attestation_TF_M_tech_forum.pdf Date - 16th April 2020
TF-M: SP scheduling by NSPE
Переглядів 2Місяць тому
SP scheduling by NSPE Date - 2nd April 2020
TF-M Automated testing of interrupt handling in TF-M
Переглядів 26Місяць тому
Automated testing of interrupt handling in TF-M PDF Presentation: www.trustedfirmware.org/docs/Automated_testing_of_interrupt_handling_in_TF-M.pdf Date - 19th March 2020
TF-M Profile 1 Design RST Document
Переглядів 15Місяць тому
TF-M Profile 1 Design RST Document: www.trustedfirmware.org/docs/tfm_profile_1_new-809b731d6d90d7da51ae46156ab4a71e.rst Date - 5th March 2020
TF-M Fuzzer Tool Proposal
Переглядів 3Місяць тому
TF-M Fuzzer Tool Proposal
TF-M: CMSIS-Zone
Переглядів 2Місяць тому
TF-M: CMSIS-Zone
Mbed TLS Virtual Workshop- Recording 2
Переглядів 9Місяць тому
Mbed TLS Virtual Workshop- Recording 2
Mbed TLS Virtual Workshop- Recording 1
Переглядів 22Місяць тому
Mbed TLS Virtual Workshop- Recording 1
Unification of Chain of Trust Descriptors
Переглядів 11Місяць тому
Unification of Chain of Trust Descriptors
NUMA-aware PER-CPU framework in TF-A
Переглядів 12Місяць тому
NUMA-aware PER-CPU framework in TF-A
Using the SMC Fuzzing Module in TF-A
Переглядів 21Місяць тому
Using the SMC Fuzzing Module in TF-A
TF-RMM CPPCheck integration / TF-A-Tests enhancements and testing for TF-RMM
Переглядів 19Місяць тому
TF-RMM CPPCheck integration / TF-A-Tests enhancements and testing for TF-RMM
TF-RMM Stage 1 Memory Management
Переглядів 48Місяць тому
TF-RMM Stage 1 Memory Management
EL3 GPT Fusing Discussion on various issues and approaches
Переглядів 57Місяць тому
EL3 GPT Fusing Discussion on various issues and approaches
Firmware Handoff on FVP
Переглядів 17Місяць тому
Firmware Handoff on FVP
TrustedFirmware OpenCI and MISRA testing using ECLAIR
Переглядів 12Місяць тому
TrustedFirmware OpenCI and MISRA testing using ECLAIR
Migration to PSA Crypto API
Переглядів 61Місяць тому
Migration to PSA Crypto API
SVE Enablement in RMM for Realms
Переглядів 12Місяць тому
SVE Enablement in RMM for Realms
RAS Handling
Переглядів 27Місяць тому
RAS Handling

КОМЕНТАРІ

  • @Ruhgtfo
    @Ruhgtfo 2 дні тому

    🍪🍩🍪🍪🍪

  • @kirakirsch8991
    @kirakirsch8991 9 днів тому

    I've waited for this

  • @mrlithium69
    @mrlithium69 13 днів тому

    Great. I just got 4 of these for christmas. this is big news. congrats

  • @eavids128
    @eavids128 14 днів тому

    Oh my god he did it! I was hype waiting for someone to do it!

  • @Koutsie
    @Koutsie 14 днів тому

    Hey atomic, please please add a proper link and maybe even an hashtag if you upload CCC talks - makes discovery and finding the slides etc easier 🤝

  • @RickDkkrd
    @RickDkkrd 19 днів тому

    That moment when a noob hw hacker obliterates your new chip's security within a month after the release.

    • @warguy6474
      @warguy6474 17 днів тому

      to be fair doesnt the tesla have the same problem as well? The glitching in this im assuming also uses some voltage injection so it seem often overlooked. Not sure how it would be consistently protected against.

    • @Dong_Harvey
      @Dong_Harvey 14 днів тому

      It seems that there is no real means to protect any of these devices long term, just clever tricks, some of which are patented and thus unavailable to 'competitors'. Ultimately, this dude did an awesome job

  • @Elixz89
    @Elixz89 20 днів тому

    Very informative, Thanks

  • @mikehibbett3301
    @mikehibbett3301 21 день тому

    Fantastic review, thanks.

  • @martingerken7094
    @martingerken7094 21 день тому

    It is a copy/reupload from CCC, this guy is robbing viewtime! ua-cam.com/video/T82fNCPnbjw/v-deo.html

    • @ThylineTheGay
      @ThylineTheGay 19 днів тому

      the guy has 175 subs and this video has 3k views, does it really matter

  • @TheDiveO
    @TheDiveO 21 день тому

    Alternate title: Dr Juice, or how the Glitch stole Xmas

  • @piman13_71
    @piman13_71 21 день тому

    lol silly KDE and it shake to find mouse. Watch his mouse. It’s kinda funny

    • @anonimenkolbas1305
      @anonimenkolbas1305 21 день тому

      It's a pretty new addition, actually. It just one day became enabled by default. I've noticed it on my desktop too.

    • @nil0bject
      @nil0bject 20 днів тому

      it's because apple introduced it in the macos

    • @nil0bject
      @nil0bject 20 днів тому

      lol it IS the MacOS.... he's on an apple laptop... how did you not recognise that and immediately jump to kde?

    • @anonimenkolbas1305
      @anonimenkolbas1305 20 днів тому

      @@nil0bject Oh, I have no clue about its appearance in the talk recording. I didn't notice it. I know Apple came up with it first, and I've seen it on Mac OS. But recently, KDE got it too, and unfortunately it activates way too soon.

    • @nil0bject
      @nil0bject 20 днів тому

      @@anonimenkolbas1305 all good, i was replying to the OP. your repy is valid. have a good one!

  • @huihuihuihuihuihui1
    @huihuihuihuihuihui1 22 дні тому

    @eevblog uCurrent mentioned!

  • @tcocaine
    @tcocaine 22 дні тому

    Excellent talk.

  • @cameramaker
    @cameramaker 22 дні тому

    Or it is a backdoor, to place intentionally the debug enable/disable bits where the 0011 pattern goes. And the prioritization of double disable - instead of rendering the chip to be bricked :D

  • @FAKEAXIS
    @FAKEAXIS 22 дні тому

    Damn that was quick, was hoping this chip would be a little harder to crack lol

  • @pooyankhosravi5337
    @pooyankhosravi5337 22 дні тому

    Why this has so few views?!

  • @colinofay7237
    @colinofay7237 22 дні тому

    Very interesting

  • @wildorb1209
    @wildorb1209 22 дні тому

    i dont get it, why steel the video and reupload.

  • @shakkar23
    @shakkar23 22 дні тому

    And so on and so forth

  • @MandyBurns-h8n
    @MandyBurns-h8n 23 дні тому

    You are doing a great job! Can you help me with something unrelated? I have a SafePal wallet with TRC20 USDT in it and I have my recovery phrase: [pride pole obtain together second when future mask review nature potato bulb]. How do I transfer them to Binance?

    • @uirwi9142
      @uirwi9142 20 днів тому

      please be careful not to share your recovery keys publicly, it's very risky because someone could empty your wallet

    • @uirwi9142
      @uirwi9142 20 днів тому

      hi Mandy, are you there?

    • @uirwi9142
      @uirwi9142 20 днів тому

      scammer! but why?

  • @m3lx
    @m3lx 24 дні тому

    Holy hell this is the best thing I've seen this year!

    • @piman13_71
      @piman13_71 21 день тому

      That’s a low bar…

    • @BillyBonesYT
      @BillyBonesYT 21 день тому

      @@piman13_71 It's been 6 days so far this year...

  • @YoelLouise
    @YoelLouise Місяць тому

    Great analysis, thank you! I need some advice: My OKX wallet holds some USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). Could you explain how to move them to Binance?