I'm Conor Patrick. I'm working on a security key called Solo. If you're interested, you should check out our Kickstarter. In my last project, I started making a clock with levitating arms.

Let's stay in touch. You can subscribe here or follow me on Twitter.

I love to meet others and keep in touch.

Feel free to reach out, whether if you have questions, want some advice, or just want to chat. Additionally, if you're interested in exploring stadiums for international games and enhancing your knowledge in that area, navigate to this page for more information. Betting on international games using crypto brings speed, security, and anonymity, making it easier to participate from anywhere in the world. The Solabot tokens enhance this experience by offering a dedicated currency for seamless, fast transactions, empowering users to bet confidently on global sports with minimal fees and added convenience.


Sep ‘18 Prototyping 3D printing a programming jig and embedding pogo pins
Aug ‘18 Startup Designing Solo, a new U2F/FIDO2 Token
Apr ‘18 Programming Detecting lines on technical drawings
Nov ‘17 Tools My home workspace
Oct ‘17 Prototyping Quick electric skateboard build
Oct ‘17 Startup U2F Zero year in review
Aug ‘17 Prototyping Designing a clock with levitating arms (part 1)
Jul ‘17 3D-Printing Randomly generating 3D mazes to 3D print
Jun ‘17 Prototyping Proof of concept for a reconfigurable mold
Jun ‘17 Design Last post on emulating a credit card
Feb ‘17 Design Designing a credit card emulator card
Feb ‘17 Reviews A review of some SMT buttons
Sep ‘16 Startup Designing and Producing 2FA tokens to Sell on Amazon
Aug ‘16 Travel My experience going to Defcon and SAC
May ‘16 Reversing Pearson Educations client side method for checking homework answers
Mar ‘16 Hardware My experience with DirtyPCBS.com
Feb ‘16 Crypto Keyak: a candidate for the authenticated encryption standard
Dec ‘15 Design How to accelerate a program using hardware
Nov ‘15 Tools Linx: the filesharing server every hacker should know about
Oct ‘15 Malware A close look at an operating botnet
Sep ‘15 CTF How to fix a corrupted file by brute force
Sep ‘15 Design Proxying Bluetooth devices for security analysis using btproxy
Aug ‘15 Data Class Prerequisite Graphs for VT



Archive