Go to content Phone human-readable description of the message we trying to accomplish. Search human-readable description of the message we trying to accomplish. Map pin human-readable description of the message we trying to accomplish.

Showing all entries in ‘Blog’

The Google Cloud is Next!

I’m looking forward to hearing what’s new at Google Cloud Next 2018 in San Francisco, as it’s a very exciting time to be in the device security space, with more and more devices connecting to cloud services.



The challenge of scaling down

The key thing about MCU-based devices is that they are small, slow and very, very (!) space-constrained (compared to Cortex-A systems)– so this provided us with a really intriguing challenge....


Digital Holograms™

When enrolling with an OEM’s cloud, a device’s Root of Trust (RoT) might not be enough to determine if a device is counterfeit or not. More is definitely needed...but why and when?




In the Game of Trusts, Verify is the King.

Not all TEEs are equal. All the 1.2 billion+ devices with Trustonic Secured Platform have a root of trust injected in the factory, meaning that the device’s identity can be trusted.