<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Posts on CodetoCore</title><link>http://codetocore.com/posts/</link><description>Recent content in Posts on CodetoCore</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sun, 10 May 2026 09:49:32 +0530</lastBuildDate><atom:link href="http://codetocore.com/posts/index.xml" rel="self" type="application/rss+xml"/><item><title>Hardware Root of Trust: What It Actually Means</title><link>http://codetocore.com/posts/hardware-root-of-trust-explained/</link><pubDate>Tue, 17 Jun 2025 00:00:00 +0000</pubDate><guid>http://codetocore.com/posts/hardware-root-of-trust-explained/</guid><description>Hardware Root of Trust is one of the most-used and least-understood terms in embedded security. A short, practical breakdown of what it is, what it isn&amp;#39;t, and how to tell whether a product genuinely has one.</description></item><item><title>Why Your Secure Boot Probably Isn't Actually Secure</title><link>http://codetocore.com/posts/secure-boot-pitfalls/</link><pubDate>Sat, 10 May 2025 00:00:00 +0000</pubDate><guid>http://codetocore.com/posts/secure-boot-pitfalls/</guid><description>Most secure boot implementations look fine on paper but fail under realistic threat models. Eight common pitfalls — and what fixing them requires.</description></item><item><title>About</title><link>http://codetocore.com/about/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>http://codetocore.com/about/</guid><description>&lt;p&gt;I&amp;rsquo;m Somesh Singh — an embedded software engineer specializing in
hardware-rooted security for connected devices.&lt;/p&gt;
&lt;p&gt;Most of my work sits at the intersection of three things: ARM
Cortex-M and Cortex-A platforms, Trusted Firmware and TrustZone-based
architectures, and the operational discipline of building
production-grade reference designs that global OEMs adopt for their
own products.&lt;/p&gt;
&lt;p&gt;I work at Microchip Technology, where I architect secure firmware for
IoT and EV charging platforms, drive security enablement using
hardware Secure Elements and PKI, and serve as the security subject
matter expert across the team. Recent work includes contributing to
$20M+ in EV Charger reference design wins, and leading the migration
from software certificates to hardware Secure Element-based key
provisioning — which delivered a 95% reduction in critical
vulnerabilities on the platform.&lt;/p&gt;</description></item></channel></rss>