Thesis abstract
Managed-service providers often ask Level-1 technicians to stage FortiGate firewalls under tight change windows. FortressFlash addresses this usability gap with a self-contained, Raspberry Pi Pico–based appliance that lets L1 staff deliver a pre-vetted, version-controlled baseline configuration over UART—without a laptop—while embedding hardware-rooted security. The prototype couples a Waveshare RP2040-Plus, capacitive-touch display, and microSD storage with modular MicroPython firmware. Security primitives planned for Pico 2 W include signed/attested boot, OTP-sealed keys, and hardware SHA-256 acceleration.
What you'll find here
- Prototype design, firmware and security plans for a Raspberry Pi Pico–based deployer.
- SD-backed, PIN-gated configuration workflow and prompt-paced serial dispatcher (firmware in progress).
- Roadmap to migrate to Pico 2 W for signed boot, OTP, and hardware SHA-256 acceleration.
Files in this directory: karels_fortressflash_thesis_2025.pdf and karels_fortressflash_thesis_2025_sha256sum.txt.
Integrity verification (client-side)
Click Verify PDF integrity to download the PDF & checksum and compute the SHA-256 in your browser. The script prints diagnostic info if something goes wrong (network, headers, server responses).
Status: idle — press “Verify PDF integrity”.