<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Rp2350 on Bits and Bytes Security</title><link>/tags/rp2350.html</link><description>Recent content in Rp2350 on Bits and Bytes Security</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Sun, 22 Feb 2026 00:00:00 +0000</lastBuildDate><atom:link href="/tags/rp2350/index.xml" rel="self" type="application/rss+xml"/><item><title>Reproducing the RP2350 OTP Power Glitch Attack</title><link>/posts/2026/02/rp2350_otp_attack_experiment.html</link><pubDate>Sun, 22 Feb 2026 00:00:00 +0000</pubDate><guid>/posts/2026/02/rp2350_otp_attack_experiment.html</guid><description>Introduction In this blog post, I walk through my experience replicating the RP2350 OTP hack by Aedan Cullen. I followed the progress of the RP2350 Hacking Challenge (the first edition; Raspberry Pi later launched a second edition), and when the deadline arrived there were multiple solutions. Some were more interesting than others, in my opinion. One I found particularly interesting was Aedan Cullen&amp;rsquo;s, which relies on glitching the OTP power source.</description></item></channel></rss>