Is Your Smartphone’s Hardware Safe?
Smartphones are commonly lost or stolen, but could that impact your security? The Ledger Donjon targeted a recent SoC to find out exactly how secure today’s smartphones are.
Find our latest security research and analyses from the Donjon team.
Smartphones are commonly lost or stolen, but could that impact your security? The Ledger Donjon targeted a recent SoC to find out exactly how secure today’s smartphones are.
The Vulnerability Exposing Tangem Cards to Brute-Force Attacks...
Tangem Genuine Check Bypass on Android Application
Why Secure Elements make a crucial difference to Hardware Wallet ...
TEE: When “Trusted” Doesn’t Mean “Secure&...
SCADL: A new side-channel attack tool using deep learning...
Argo CD Security Misconfiguration Adventures
Cargo-checkct: our home-made tool guarding against timing attacks...
Funds of Every Wallet Created With The Trust Wallet Browser Exten...
Firmware Extraction: Evil-Maid Attacks on Blockstream Jade Hardwa...
Prepping for Pwn2Own 2022
App Streaming: a New Development Paradigm for Environments with C...
New PIN screen on Ledger Nano products
Integrating fault injection in development workflows...
Mounting a low-cost laser bench
Black-box attacks on white-box ECDSA
Donjon CTF 2021: Capture the Fortress!
On the security of Booba’s music video and NFTs...
Remote laser faults injection during pandemic
Protecting SSH keys with TPM 2.0, now available on Debian...
On the security model of software wallets
Kaspersky Password Manager: All your passwords belong to us...
A Compact Electromagnetic Fault Injection Setup
The Making of picoHSM Challenge
Discovering SMPC through CTF Challenges
Exploiting Smart Contracts in CTF Challenges
Ghostbuster: Spectre exploitation in real life
CTF 2020: Capture the Fortress
Follow-up on PIN verification against side-channel attack: KeepKe...
Lit by Laser: PIN Code Recovery on Coldcard Mk2 Wallets...
Ledger’s CTF 2018 and side-channels
Everybody be Cool, This is a Robbery!
OLED screen (minor) vulnerability
Unfixable Seed Extraction on Trezor – A practical and relia...
Extracting seed from Ellipal wallet
Breaking Trezor One with Side Channel Attacks
Extracting seeds from Wallets
Lascar: Donjon Side Channel Library
Rainbow
Introducing Ledger Donjon