These days there's quite a few embedded devices in our everyday lives: Starting from your mobile phone, your game console or your set-top box and ending at things like your router or your laptop's keyboard. While all of them usually serve different purposes, there's one thing they have in common: Just using them for their intended application is insanely boring and getting your own to run on them is a lot more fun!
This talk will essentially be a list of mistakes everyone and their mother makes when they try to design a secure device and how they can be exploited. No new research but instead the core concepts of breaking into the mentioned devices and neat little tricks you may not know about will be presented to hopefully give you the ability to break into your own favorite gadget you have at home!