Thesis abstract

Managed-service providers often ask Level-1 technicians to stage FortiGate firewalls under tight change windows. FortressFlash addresses this usability gap with a self-contained, Raspberry Pi Pico–based appliance that lets L1 staff deliver a pre-vetted, version-controlled baseline configuration over UART—without a laptop—while embedding hardware-rooted security. The prototype couples a Waveshare RP2040-Plus, capacitive-touch display, and microSD storage with modular MicroPython firmware. Security primitives planned for Pico 2 W include signed/attested boot, OTP-sealed keys, and hardware SHA-256 acceleration.

⤓ Download thesis (PDF)

What you'll find here

  • Prototype design, firmware and security plans for a Raspberry Pi Pico–based deployer.
  • SD-backed, PIN-gated configuration workflow and prompt-paced serial dispatcher (firmware in progress).
  • Roadmap to migrate to Pico 2 W for signed boot, OTP, and hardware SHA-256 acceleration.

Files in this directory: karels_fortressflash_thesis_2025.pdf and karels_fortressflash_thesis_2025_sha256sum.txt.

Integrity verification (client-side)

Click Verify PDF integrity to download the PDF & checksum and compute the SHA-256 in your browser. The script prints diagnostic info if something goes wrong (network, headers, server responses).

Status: idle — press “Verify PDF integrity”.