Viktor Petersson logo
Meet
Viktor

Ramblings on Entrepreneurship, Dev(Sec)Ops, Linux, Remote Work, and Security Shenanigans.

Meet Viktor

Hey there! I'm Viktor, a proud nerd and serial entrepreneur

I've launched ventures like YippieMove, Blotter, and Screenly. I also host the podcast Nerding Out with Viktor.

Viktor Petersson

Latest Podcast

podcast cover image

SBOMs, CycloneDX, and Software Security with Steve Springett

Join Viktor Petersson on this episode of Nerding Out with Viktor as he dives into the world of software security and compliance with special guest Steve Springett! They geek out over the latest developments in SBOMs (Software Bill of Materials), exploring how Project Koala is shaping the future of cybersecurity. From breach fatigue to the importance of standardization, Steve shares his expert insights on the challenges and opportunities facing organizations today. Get ready for a thought-provoking conversation that will leave you with a deeper understanding of the complex relationships between software security, compliance, and industry standards.


podcast cover image

RFID Hacking with Iceman: Exploring the Intricacies RFID Security

In this engaging episode of "Nerding Out with Viktor", Viktor delves into the fascinating world of radio frequency (RF) hacking with his guest Iceman. Explore the latest techniques for capturing and replaying Bluetooth signals, as well as the potential vulnerabilities in mobile credentials. Discover how a simple Proxmark device can be the starting point for HF experimentation and learning from Android phones. Iceman shares expert insights on the tools of the trade, from hardware to software, highlighting the importance of understanding the fundamentals and the game-changing power of access to sensitive information.


podcast cover image

Uncovering Firmware Security: A Deep Dive with Binarly's Philipp Deppenwiese

In this episode of Nerding Out with Viktor, Philipp Deppenwiese sheds light on the crucial yet often overlooked aspect of secure computing: attestation. As a expert in his field, Philipp explains how attestation ensures the integrity and trustworthiness of systems, from booting up to executing code, by creating an append-only log of hashes that can't be tampered with. This innovative approach goes beyond traditional signature-based verification methods, providing a robust defense against malicious attacks. With real-world examples and insider knowledge, Philipp breaks down the importance of attestation in modern computing, highlighting its potential to revolutionize the way we think about system security.

Mastodon