This article introduces a series of blog posts dealing with embedded systems security. This set of articles will mainly focus on Hardware but may also concern software security (e.g. firmware) or cryptography. Think of it as a selection of various resources, more or less technically accessible.
