Security Through Obscurity with Edge Devices
We often work with clients who produce and use edge devices, which typically use non standard ports. Using obscure tools, like a hot air gun or tweezers, the memory can be removed off these devices to search it for potential secrets and ways to compromise it.
In one case, Jesson Soto Ventura, Principal Consultant, found a pair of private keys on a device that enabled the compromise of production devices. In summary, avoid using shared secrets on edge devices to prevent vulnerabilities.