Aryan ThakurAsymmetry #1.1: PerceptionYou know when people tell you “it’s all in your head”? They’re usually right.6 min read·Jun 10, 2021----
Aryan ThakurUsing Tor To Secure IoT DeploymentsThis project was an inspired replica (almost) from a project in a research paper written by Dr. Gregory Epiphaniou from the University of…8 min read·May 30, 2021----
Aryan ThakurICS Security — The Blockchain WaySaudia Arabia 2017, Ukraine 2015, Iran 2007 and United States of America 2021.7 min read·Feb 26, 2021----
Aryan ThakurSecuring Cyber-Physical Systems IThis is the first-most article in the Securing Cyber-Physical Systems Series, where I introduce the series and talk about Hardware…7 min read·Jan 18, 2021----
Aryan ThakurIoT Security: Firmware ExploitationIn this article we take a look at firmware exploitation. I exploit a wireless camera and talk about simple and advanced safety practices.9 min read·Oct 30, 2020----
Aryan ThakurinThe IOT MagazineIntroduction To IoT Structure & Security: The Achilles HeelExploring Gateways and IoT Vulnerabilities on a basic level6 min read·Oct 10, 2020----
Aryan ThakurA Look Into The Large World Of NanosensorsThe objective of these sensors is to screen and measure any chemical, mechanical, and physical changes that are related to the analyte…5 min read·Mar 24, 2020----