Aryan ThakurAsymmetry #1.1: PerceptionYou know when people tell you “it’s all in your head”? They’re usually right.Jun 10, 2021Jun 10, 2021
Aryan ThakurUsing Tor To Secure IoT DeploymentsThis project was an inspired replica (almost) from a project in a research paper written by Dr. Gregory Epiphaniou from the University of…May 30, 2021May 30, 2021
Aryan ThakurICS Security — The Blockchain WaySaudia Arabia 2017, Ukraine 2015, Iran 2007 and United States of America 2021.Feb 26, 2021Feb 26, 2021
Aryan ThakurSecuring Cyber-Physical Systems IThis is the first-most article in the Securing Cyber-Physical Systems Series, where I introduce the series and talk about Hardware…Jan 18, 2021Jan 18, 2021
Aryan ThakurIoT Security: Firmware ExploitationIn this article we take a look at firmware exploitation. I exploit a wireless camera and talk about simple and advanced safety practices.Oct 30, 2020Oct 30, 2020
Aryan ThakurinThe IOT MagazineIntroduction To IoT Structure & Security: The Achilles HeelExploring Gateways and IoT Vulnerabilities on a basic levelOct 10, 2020Oct 10, 2020
Aryan ThakurA Look Into The Large World Of NanosensorsThe objective of these sensors is to screen and measure any chemical, mechanical, and physical changes that are related to the analyte…Mar 24, 2020Mar 24, 2020