Description
Your tinkering friend was frustrated with the overly simple serial communication between their two IoT boards, which was vulnerable to interception by malicious individuals. They therefore developed a new obfuscation method, proudly named “Golgrot13”: can you prove to them that this is not the brightest idea using a logic analyzer capture?
Files
-
golgrot13.vcd
4.61 KiB – b3004bb1c672d38c277a609f27eda157d5497c79fb7694a537b23b465c1236e4
Author
Flag
Submit your solution
You can submit your writeup for this challenge. Read the FAQ to learn how to proceed.
You need to be logged in to submit a writeup.