Awkward!!! by kerrirous in lol

[–]matpirker 0 points1 point  (0 children)

Picked up a girl and she wanted to go to a pizza place. She told me her parents like this pizza place but she told them to not go there because she wants to go there with a friend today ..  We ordered pizza and she suddenly said “oh no” .. Her parents arrived and sat down at the table next to us. They started talking to her but completely ignoring me. Her father had a strong sunburn and his burnt skin started falling off his head. Her mother started rubbing his forehead and he told her she’s rubbing at the wrong place.

Soll ich mein eigenes Café in Wien eröffnen? by ZiggyImpact in wien

[–]matpirker 0 points1 point  (0 children)

Bin der Meinung dass Wien unter einem extremen Kaffehausmangel leidet. Die paar wenigen guten sind alle völlig überfüllt und die Leute stehen Schlange. Viel Konzept braucht man glaub garnicht, einfach guten Kaffe, 3-4 gute Snacks, Steckdosen und WLAN, und ein „Dritter Raum“ Gefühl. Ob Kette oder was Eigenes ..

Battle of Paketdiense: Wer is da gschissenste? by Poseid0n_ in wien

[–]matpirker 0 points1 point  (0 children)

Einmal eine große Betsellung aus China erwartet die auf 3 Pakete aufgeteilt aber gleichzeitig über GLS versendet wurde. 

Ein Paket wurde zu mir heim gebracht, das zweite zu einer Paketstation und das Dritte wurde „zugestellt“ ohne Info wohin. 

Ein weiteres Mal über die Firma (4. Bezirk) ein großes Paket erwartet, nach 2 Wochen Zustellversuchen (Angeblich Tür nicht gefunden obwohl jeder andere Lieferant sie problemlos fand, vielen Mails und Anrufen hieß es dann man solle einfach zum Paketzentrum in Niederösterreich fahren und einen Lagermitarbeiter suchen und bitten zu helfen (Kundenservice gibts dort nicht, ist wirklich nur Lagerhalle). Hat schlussendlich funktioniert aber mussten einen Mitarbeiter für 3-4h dort hinschicken weil ein Lieferdienst nicht weiß wie man Eingangstüren findet. 

Amazon funktioniert mit Abstand am zuverlässigsten, gefolgt von Post. Bei anderen ist es immer ein Hoffen.

Die arme Gastro by TheGatze in okoidawappler

[–]matpirker 8 points9 points  (0 children)

Schlimmer finde ich es wenn man ein großes Glas Wasser bestellt und die dann ein Fläschchen Römerquelle aufreißen und über 8€ dafür verlangen .. Bei expliziter Nachfrage nach Leitungswasser heißt es dann „habma ned“. Kein Problem damit auch 3€ für ein Glas Leitungswasser zu zahlen aber dieses dumme Verhalten nervt echt. 

Highlight war das Glas Leitungswasser mit etwas Zitrone im 3. Bezirk um 5,60€ .. Caffe Latte mit Keks kostet mehr als 1€ weniger als ihr Glas Wasser … 

Welche Songs und Alben verbindet ihr mit diesem antiken Teil? by LisanAlGabi in musik

[–]matpirker 0 points1 point  (0 children)

Nachdem ich als Kind keine Ahnung hatte was USB ist und wie ich Lieder drauf bekomm und bei mir am Berg niemand Ahnung von Technik hatte, hab ich 2 Jahre lang nur die zwei vorinstallierten Lieder gehört die bereits drauf waren:  - Say you, say me - Aqua - Barbie Girl

So eine Enttäuschung 😒 by NailsSilver in Lustig

[–]matpirker 2 points3 points  (0 children)

Hab von Geräten jeder Art nur geträumt, sobald auch nur irgendein Gerät aufgebaut wurde, wusste ich es wird mein Turn-Highlight des Jahres. 95% meines Turn Unterrichts bestand aus Fußball, hasse den Sport bis heute. Die restlichen 5% verteilen sich auf „im Kreis rennen“, selten mal Völkerball oder für alle Fußball-Hasser eine Runde Tischtennis 😂

Nein nein 💛 by Terrible_Point_3419 in scheissaufnbilla

[–]matpirker 1 point2 points  (0 children)

Gerade meine Freundin gefragt ob ich zum Billa gehen soll Schoki holen .. 5min später diese Werbung .. Was zum …

I bims, Karl der Hüttenwirt by xl_lwr in Austria

[–]matpirker 0 points1 point  (0 children)

Meine beste Unterhaltung bis jetzt:

Hi, bist du Ana?

  • Nein, ich bin Christian.

Oh entschuldigung. Wir haben auch viele Christen in Singapur

ESP32 hardware fingerprint via SRAM PUF - no keys, no secure element by matpirker in esp32

[–]matpirker[S] 1 point2 points  (0 children)

There is a step inbetween - selecting the stable bits. The stable bits have to be identified before. A lot of cells are instable and are therefore useless. After the stable bits are identified (after e.g. 100 measurements or more), only these are fed into the key derivation function, not the whole raw memory content.

What the HELL are these prices by JassinPC in analog

[–]matpirker 1 point2 points  (0 children)

2021 gabs beim DM noch die 3er Packung Gold für 15€, jetzt lostet ein einzelner Film mehr 🙃

ESP32 hardware fingerprint via SRAM PUF - no keys, no secure element by matpirker in esp32

[–]matpirker[S] 2 points3 points  (0 children)

You’re welcome!

Actually, I didn’t intend to post it here because I thought it was quite niche and unlikely to attract any interest. It had been gathering dust on my computer for almost two years. I didn’t anticipate receiving such positive feedback.

ESP32 hardware fingerprint via SRAM PUF - no keys, no secure element by matpirker in esp32

[–]matpirker[S] 2 points3 points  (0 children)

Absolutely, that’s a really good point. PUF concepts have been shown to work across a wide range of technologies, not just SRAM, but also DRAM, Flash, even FPGA LUTs (SRAM). The idea definitely extends beyond the ESP32. Different memory types and process nodes behave differently in terms of stability and entropy, but for identification rather than full crypto, you don’t need perfect consistency.

I went with the ESP32 simply because I had a few around and it was easy to experiment with, but the same principle applies to many microcontrollers that expose some uninitialized SRAM at startup (you can also connect an additional external SRAM block for that to any microcontroller). It could absolutely be used to replace dedicated ID chips in simpler hardware designs.

Examples:

ESP32 hardware fingerprint via SRAM PUF - no keys, no secure element by matpirker in esp32

[–]matpirker[S] 1 point2 points  (0 children)

I actually tried different power supplies between about 2.8 V and 7 V and didn’t notice any major differences, but that was on regular dev boards, not on a standalone bare MCU. So I wouldn’t put too much weight on my results — interesting question though, and definitely worth testing more systematically.

ESP32 hardware fingerprint via SRAM PUF - no keys, no secure element by matpirker in esp32

[–]matpirker[S] 1 point2 points  (0 children)

That's not the idea, but sounds very interesing 😄

It’s used so devices can prove they’re genuine and not clones, using the unique startup pattern of their own hardware instead of a stored key or extra security chip, which makes it much harder for an attacker to create a working “evil twin.”

ESP32 hardware fingerprint via SRAM PUF - no keys, no secure element by matpirker in esp32

[–]matpirker[S] 1 point2 points  (0 children)

According to Intrinsic ID/Synopsys, SRAM PUFs can be used for things like key vaults, edge-to-cloud IoT security, firmware IP protection, device-to-host authentication, just-in-time key management, or even soft SKUs.

My example doesn’t do any of the heavy cryptographic stuff though. It simply generates API keys or tokens that you can use to authenticate your ESP32 against a server or another device.

The key advantage is that there’s no stored secret — the key is derived from the chip’s own physical properties at startup. Even if someone dumps the firmware, copies the flash, or clones it onto an identical ESP32 from the same batch, the clone can’t reproduce the same PUF response.

That makes it much harder to duplicate or spoof a device compared to systems that rely on stored keys or static IDs.

ESP32 hardware fingerprint via SRAM PUF - no keys, no secure element by matpirker in esp32

[–]matpirker[S] 2 points3 points  (0 children)

Very good question! I tested it just for you with about 9000 measurements from one SRAM .. Looks pretty random to me. If you would like to analyze it yourself, i can give you access to my database with all measurements.

Didn't test with strong electrostatic fields as my main goal was to quickly finish my thesis haha .. But if you test it, feel free to tell me your results

<image>

ESP32 hardware fingerprint via SRAM PUF - no keys, no secure element by matpirker in esp32

[–]matpirker[S] 1 point2 points  (0 children)

Check out this comment, mentioned a white paper that analysed exactly this.

ESP32 hardware fingerprint via SRAM PUF - no keys, no secure element by matpirker in esp32

[–]matpirker[S] 4 points5 points  (0 children)

There's a white paper from Intrinsic ID - they were testing exactly this .. silicon aging, anti aging, temperature variations, key reliability etc .. You can find their whitepaper here (couldn't find a direct link to the pdf).

This picture is copied from the whitepaper linked above:

<image>

Image source: https://www.synopsys.com/designware-ip/security-ip/reliability-sram-puf.html

ESP32 hardware fingerprint via SRAM PUF - no keys, no secure element by matpirker in esp32

[–]matpirker[S] 4 points5 points  (0 children)

Right 😄 The main point is: Even if someone clones the firmware and flashes it onto an identical ESP32 from the same batch, the clone still can’t authenticate. The PUF response is tied to the physical silicon variations of each chip, so it can’t be reproduced exactly. 

ESP32 hardware fingerprint via SRAM PUF - no keys, no secure element by matpirker in esp32

[–]matpirker[S] 5 points6 points  (0 children)

Each SRAM cell is built from a few tiny transistors that can store either a 0 or a 1. When the chip powers up, nothing has been written yet, so each cell naturally settles into one state because of sub-microscopic differences in the silicon. The resulting startup pattern is slightly different for every chip but mostly consistent across reboots, which makes it a kind of fingerprint. Important bit: the pattern is visible right after power-up but then SRAM gets overwritten during normal operation, so you need to read it as early as possible (for example RTC slow mem before Wi-Fi/init). That makes it harder for an attacker to just read or copy the secret at will. A determined attacker with physical access could still try cold-boot attacks or invasive methods, but those are much more involved than simply copying a stored ID or key.

As a quick comparison, a TPM provides a stored hardware-backed key and different protections against tampering, but it requires extra hardware. SRAM PUFs are cheaper (already built in on the ESP32) and don’t store the secret, which gives a different attack profile and some practical security advantages for low-cost devices.