Skip to Main Content
PunchThrough-97

BLE Security: Where to Begin When Creating a Connected System

Whether it’s your run-of-the-mill email phishing attack from a Nigerian prince, or a corporate scale data breach that leaks millions of people’s identifying information, all of us can probably recall a time where we’ve been the target of a cybersecurity attack in one form or another.  By now, most people are well aware of the need for taking proper security precautions while online and have probably even developed a pretty good…

Mastering all 5 Kotlin Scope Functions

It should come as no surprise that our Android team here at Punch Through loves Kotlin, and that we strive to write idiomatic Kotlin, taking advantage of its unique language features whenever possible. Some common questions we get from newer team…