By Claudio Bozzato and Lilith [-_-];.
Following our previous engagements (see blog posts 1, 2, 3 and 4) with Microsoft’s Azure Sphere IoT platform, we decided to take another look at the device, without all the rush and commotion that normally entails a hacking challenge.
Today, we’re…
[[ This is only the beginning! Please visit the blog for the complete entry ]]