#tockos

2025-07-14

It's official! #TockWorld8 will be hosted at Microsoft in Redmond, WA, just a stone's throw from @rustconf on September 5th. Join us for a schedule on #TockOS in new places, #Rust verification, low-level LLVM hackery, and more!

world.tockos.org/tockworld8/re

2024-09-03

In Summary, Rust + Tock OS Architecture + Lightweight verification is a solution to provide safe firmware.

#OSFC #RustLang #TockOS

Samir and the Summary slide, reading:

* Rust
  - Memory management Rust language safety
  - Undefined behaviour is explicit and minimized
* Architecture
 - Faulty drivers capsules are isolated from kernel
 - Concurrency/Locking avoided
* Lightweight Verification
 - Logic bugs via verification
 - Malicious attacks cannot break the easily auditable compile-time safety
2024-09-03

"An integer overflow caused $370M to vaporize in 40 seconds."

When a rocket exploded in flight because of two simultaneous integer overflow in independently written systems.

Luckily the industry has learned from this, right? Not really, with some Boeing planes having to be rebooted every 51 days to prevent catastrophically wrong information being shown to pilots.

This is Samir's talk on Tock OS, or how to secure firmware at compile time.

#OSFC #OSFC2024 #TockOS #RustLang

Samir (left) with the opening slide reading

Provable Security in Embedded Systems: Verification Work in Tock OS

By Samir RashidSamir next to the slide showing a headline that reads:

Boeing 787s need to be turned off and on every 51 days to prevent "misleading data" being shown to pilots.Samir next to the same title slide as the first picture, plus the link:

https://godsped.com/safe-firmware/
brokenbijectionxameer@hachyderm.io
2024-08-21

@TornaxO7 my own devshell , iirc , , I have the texted you the URL of the same , which I already shared in my DM to you in discourse ( in order to compare notes ) , you didn't seem to be active here or there since a while .... so
but thanks for quick reply .
thoughts on #tockos ?

2023-07-03

Oh, there are now #FIDO security keys based on #Google's #OpenSK firmware for #Titan based on #TockOS (both in #Rust), available for purchase:
shop.ftsafe.us/products/opensk

Do note that these do *not* feature a secure element and are not resistant to more advanced physical attacks or side channels, although still probably an upgrade to disk storage as long as you keep the key safe:
feitiantech.github.io/OpenSK_U

Nevertheless, an interesting toy!

2022-09-07

#Jazda is making #upstreaming progress. It's now a supported board in #TockOS ! Very bare bones, but I'm working on adding drivers.

github.com/tock/tock/pull/3182

Lup Yuen Lee 李立源lupyuen@qoto.org
2020-01-31

#FIDO 2FA security keys generated by #RustLang and #TockOS on Nordic #nRF52840... Supported by Google! Hope to see TockOS on #PineTime someday...

security.googleblog.com/2020/0

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst