Ambimat GroupAmbimatAmbiSecureeSIM InitiativeEngineering BlogAhmedabad · India · Est. 1981
Engineering blog

Practical, code-first writing on hardware-rooted security.

Current engineering content from the AmbiSecure team — FIDO, WebAuthn, JavaCard, DESFire, SAM-backed transit, passwordless rollouts, smart-card lifecycles. Each piece is written by someone who has shipped the thing they are writing about.

Latest engineering

2026-05-11 · cornerstone

Embedded Secure-Element FIDO2 Authenticators for Enterprise Identity

FIDO2 inside a nano-card and MFF2 secure element. Roaming or embedded, enterprise identity, deployment economics for production rollouts.

Read article → FIDO · Embedded Identity
2026-05-11 · cornerstone

PIV Smart Cards vs USB Tokens vs Embedded Secure Elements

Workforce identity credential matrix. Lifecycle, physical-logical convergence, certificate workflows.

Read article → PKI · Smart Cards
2026-05-11 · cornerstone

Designing Secure Email and Document Signing Platforms

S/MIME, PDF/PKCS#7, hardware-backed credentials, Long-Term Validation, the trust-list problem.

Read article → PKI · Enterprise Identity
2026-05-11 · cornerstone

Building Secure IoT Identity with Security Applets

Five JavaCard applets — provisioning, attestation, mTLS, signed update, key rotation — on a CC EAL5+ SE.

Read article → IoT · JavaCard
2026-05-11 · cornerstone

Engineering ePassport Issuance and Identity Platforms

ICAO 9303 architecture — CSCA/DSC PKI, LDS, enrolment, personalisation, inspection-system reference.

Read article → Government Identity · PKI
2026-05-11 · cornerstone

How to Choose Between Smart Cards, FIDO Tokens and Passkeys

Decision-grade comparison — threat model, lifecycle, recovery, and the choice that fits each deployment.

Read article → FIDO · Passkeys · Smart Cards
2026-05-11 · cornerstone

Secure Element vs TPM vs HSM — Where Each Fits

Three classes of hardware key-storage. What each is for, what each refuses to do, how to choose.

Read article → Cryptography · Hardware
2026-05-11 · cornerstone

Designing Secure Credential Lifecycle Management

Issuance, rotation, recovery, revocation. The operations-grade view of every credential programme.

Read article → Enterprise Identity
2026-05-11 · cornerstone

Why Transit Validators Need Offline Trust Architecture

What it takes to keep collecting fares when the backend is down — SAM-backed, validator-authoritative.

Read article → Transit · DESFire · SAM
2026-05-11 · cornerstone

JavaCard Applet Development for Enterprise Identity

What it takes to ship an applet — AID design, lifecycle, secure messaging, personalisation, mistakes to avoid.

Read article → JavaCard · Applets
2026-05-11 · cornerstone

PKI Credential Issuance for Workforce and Government

RA, CA, key custody, attestation in the issuance flow, lifecycle, audit. Architecture you can defend.

Read article → PKI · X.509
2026-05-11

How FIDO Authentication Works

An explanation of FIDO2 / WebAuthn that doesn’t need to keep apologising for the spec.

Read article → FIDO · WebAuthn
2026-05-11

Where Your AmbiSecure FIDO Key Works

Practical overview of the services and platforms that accept FIDO2 / WebAuthn in 2026.

Read article → FIDO · Practical
2026-05-11

Cyber Security Threats — What Actually Matters in 2026

The threats that drive identity and hardware-credential decisions today — phishing, MFA bypass, SIM swap, more.

Read article → Cyber Security
2026-01-20

Implementing FIDO2 Authentication — A Complete Developer Guide

A practical, code-first walk through FIDO2 registration and authentication, attestation, and the bits people get wrong.

Read article → FIDO · WebAuthn · Passwordless
2026-01-15

Designing Enterprise Passwordless Systems

What an end-to-end enterprise rollout looks like — IdP integration, recovery, mixed authenticator fleets, AAL3 architecture.

Read article → Passwordless · Enterprise MFA · FIDO
2026-01-10

Passkeys vs Traditional MFA

Where passkeys actually replace MFA, where they don't, and how to think about device-bound vs synced credentials in enterprise.

Read article → FIDO · Passwordless · MFA
2026-01-05

Platform vs Roaming Authenticators

When to standardise on the Yubikey-style external authenticator vs the device-resident platform authenticator. Tradeoffs.

Read article → FIDO · WebAuthn
2025-12-28

Understanding WebAuthn Attestation Objects

Walk a real attestation object byte by byte. AAGUID, COSE keys, attestation statement formats, and what to verify.

Read article → FIDO · WebAuthn · Cryptography
2025-12-20

Why Hardware-Backed Identity Matters

What hardware-bound credentials buy you that software ones don't. Threat models, attestation, deployment realism.

Read article → FIDO · Smart Cards · Identity
2025-12-12

APDU From First Principles

ISO 7816-4 APDUs explained: CLA, INS, P1/P2, Lc, data, Le, status words. With real DESFire/JavaCard examples.

Read article → JavaCard · Smart Cards
2025-12-05

DESFire EV1 vs EV2 vs EV3

How the DESFire family has evolved, what changed at each tier, and how to reason about legacy vs modern deployments.

Read article → DESFire · Transit · Smart Cards
2025-11-28

Designing Low-Latency Secure Transit Validators

Why transit validators need offline trust, sub-300ms response, and SAM-backed attestation. With real numbers.

Read article → Transit · DESFire · Offline Authentication
2025-11-20

Why SAMs Matter in Closed-Loop Transit

Secure Access Modules in transit reader design, when to use them, and where they earn their cost.

Read article → Transit · Smart Cards · Offline Authentication
2025-11-15

Top 3 Benefits of MFA

A clear-eyed look at what MFA actually buys you in 2026 — and where it doesn't help.

Read article → MFA · Cybersecurity
2025-11-10

Why Use Multi-Factor Authentication

An updated, technically-grounded answer to why MFA is still worth the friction.

Read article → MFA · Cybersecurity

Looking for something older?

The engineering archive preserves 24 AmbiSecure engineering posts from 2017–2025, clearly labelled and cross-linked to current coverage where it exists.

Open archive