top of page
Yocto
Tips & tricks to secure a Yocto based firmware.


Secure remote access with Yocto
Most embedded system vendors addressing the B2B market want to be able to remotely debug faulting devices to shorten their remediation delays and save some money. Unfortunately, this often results in allowing root (or any other privileged user) to log in via the SSH port. This article explain how SSH certificates and sudo can be used to secure a remote SSH connection.
Michaël Grand
Sep 48 min read


Efficient management of CVEs with Yocto
How to efficiently manage CVEs using Yocto and other open-sources tools.
Michaël Grand
Aug 45 min read
bottom of page