<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Vladimir Vician</title>
    <description>The latest articles on DEV Community by Vladimir Vician (@vladimir_vician).</description>
    <link>https://dev.to/vladimir_vician</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3802930%2F2c24fce8-5e9e-44d1-9b43-48881ee76397.png</url>
      <title>DEV Community: Vladimir Vician</title>
      <link>https://dev.to/vladimir_vician</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/vladimir_vician"/>
    <language>en</language>
    <item>
      <title>RED Delegated Act &amp; EN 18031 — What It Actually Requires in Hardware</title>
      <dc:creator>Vladimir Vician</dc:creator>
      <pubDate>Fri, 06 Mar 2026 08:10:15 +0000</pubDate>
      <link>https://dev.to/vladimir_vician/red-delegated-act-en-18031-what-it-actually-requires-in-hardware-58bb</link>
      <guid>https://dev.to/vladimir_vician/red-delegated-act-en-18031-what-it-actually-requires-in-hardware-58bb</guid>
      <description>&lt;p&gt;&lt;em&gt;Originally published at &lt;a href="https://inovasense.com/en/insights/red-delegated-act-en-18031" rel="noopener noreferrer"&gt;inovasense.com&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;We had a client with a RED-certified Wi-Fi product. Certificate from a notified body. Clean Declaration of Conformity. August 2025 deadline circled on the calendar.&lt;/p&gt;

&lt;p&gt;Then we asked: "Have you tested to EN 18031?"&lt;/p&gt;

&lt;p&gt;Silence.&lt;/p&gt;

&lt;p&gt;"We have the RED certificate," they said.&lt;/p&gt;

&lt;p&gt;"That covers Articles 3.1 and 3.2," I said. "The Delegated Act activates Article 3.3. That's different tests. And it's mandatory from August 1st."&lt;/p&gt;

&lt;p&gt;They had 14 weeks to fix it. Tight — but they made it.&lt;/p&gt;

&lt;p&gt;Most teams in 2025 still don't know this is coming.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Regulatory Context: What Changed
&lt;/h2&gt;

&lt;p&gt;The Radio Equipment Directive (RED) has contained Articles 3.3(d), (e), and (f) since 2014. For ten years, they were optional. The RED Delegated Act (EU 2022/30) makes them &lt;strong&gt;mandatory from August 1, 2025&lt;/strong&gt; for all internet-connected radio equipment.&lt;/p&gt;

&lt;p&gt;The date was delayed once from August 2024 — to allow EN 18031 to be finalized and published (early 2025). There will be no further extensions.&lt;/p&gt;




&lt;h2&gt;
  
  
  Who Is Affected
&lt;/h2&gt;

&lt;p&gt;If your product has any wireless interface and can reach the internet — directly or through a gateway — it's in scope:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Device Type&lt;/th&gt;
&lt;th&gt;In Scope?&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Wi-Fi-enabled devices&lt;/td&gt;
&lt;td&gt;✅ Yes&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Bluetooth IoT (via hub/phone)&lt;/td&gt;
&lt;td&gt;✅ Yes&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Cellular IoT (LTE-M, NB-IoT)&lt;/td&gt;
&lt;td&gt;✅ Yes&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Smart home sensors/gateways&lt;/td&gt;
&lt;td&gt;✅ Yes&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Wearables, baby monitors&lt;/td&gt;
&lt;td&gt;✅ Yes&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Wireless payment terminals&lt;/td&gt;
&lt;td&gt;✅ Yes (also EN 18031-3)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Zigbee/Z-Wave via internet gateway&lt;/td&gt;
&lt;td&gt;✅ Yes&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Pure BT with no internet data path&lt;/td&gt;
&lt;td&gt;Grey area&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;blockquote&gt;
&lt;p&gt;Industrial IoT, smart building sensors, and logistics trackers are all in scope if they have a wireless interface with an internet data path.&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  What EN 18031 Actually Requires in Hardware
&lt;/h2&gt;

&lt;h3&gt;
  
  
  EN 18031-1 — Network Protection (Art. 3.3(d))
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Hardware implication:&lt;/strong&gt; If your MCU doesn't support silicon-level hardware Secure Boot, you cannot satisfy this in firmware. This is a silicon selection decision.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Hardware Secure Boot&lt;/strong&gt; — ROM-resident bootloader verifies cryptographic signature before executing any code from flash. Not configurable in software.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;No open network interfaces by default&lt;/strong&gt; — Open telnet, unprotected MQTT endpoints fail this.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rate-limited reconnection logic&lt;/strong&gt; — retry storms = non-compliant.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  EN 18031-2 — Privacy Protection (Art. 3.3(e))
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Hardware implication:&lt;/strong&gt; An ESP32 storing Wi-Fi credentials in NVS flash (unencrypted, with no software-layer protection) does not meet SSM requirements. Plaintext keys accessible from the application context = non-compliant.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Key storage SSM&lt;/strong&gt; — EN 18031 is technology-neutral: it mandates a Secure Storage Mechanism (SSM), not a specific implementation. Accepted: TrustZone + key service, Secure Element (ATECC608B, STSAFE-A, SE050), or OTP/eFuse-based storage. Software-based SSM possible but requires extensive justification in the Technical File.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;No universal default passwords&lt;/strong&gt; — Unique per-device or forced change on first use.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Children's devices&lt;/strong&gt; — stricter data minimization and access control requirements.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  EN 18031-3 — Fraud Prevention (Art. 3.3(f))
&lt;/h3&gt;

&lt;p&gt;Applies if your device handles financial transactions or monetary value.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;The standard explicitly states that a digital signature alone is often insufficient&lt;/strong&gt; — the verification chain must be hardware-rooted.&lt;/li&gt;
&lt;li&gt;Hardware-isolated payment interfaces and anti-replay protection required.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  The Silicon Decisions You Cannot Patch
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Requirement&lt;/th&gt;
&lt;th&gt;Hardware Decision&lt;/th&gt;
&lt;th&gt;MCUs That Support It&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Hardware Secure Boot&lt;/td&gt;
&lt;td&gt;ROM bootloader + eFuse/OTP&lt;/td&gt;
&lt;td&gt;STM32U5, nRF5340, ESP32-S3, i.MX RT1170, STM32H5&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Key storage SSM&lt;/td&gt;
&lt;td&gt;TrustZone, Secure Element, OTP/eFuse, or software-based with Technical File justification&lt;/td&gt;
&lt;td&gt;ARM Cortex-M33+, ATECC608B, SE050, STSAFE-A&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Anti-rollback&lt;/td&gt;
&lt;td&gt;Hardware-enforced version tracking (OTP/eFuse or secure version counter)&lt;/td&gt;
&lt;td&gt;nRF9160, STM32H5, ESP32-S3, STM32WBA&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Per-device credentials&lt;/td&gt;
&lt;td&gt;Manufacturing provisioning&lt;/td&gt;
&lt;td&gt;eFuse burning or SE provisioning at production&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Legacy warning:&lt;/strong&gt; STM32F4, STM32F7 (Cortex-M4/M7, no TrustZone) have limited Secure Boot support. Designs on these chips may require board revision — not firmware update.&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  National Enforcement Reality
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;🇩🇪 &lt;strong&gt;Germany (BNetzA)&lt;/strong&gt; — Most active EU market surveillance. Purchases products and tests them independently. No complaint required.&lt;/li&gt;
&lt;li&gt;🇫🇷 &lt;strong&gt;France (DGCCRF + customs)&lt;/strong&gt; — Screens imports, can detain shipments pending documentation.&lt;/li&gt;
&lt;li&gt;🇳🇱 &lt;strong&gt;Netherlands (RDI)&lt;/strong&gt; — Major port of entry, active in ADCO RED joint campaigns.&lt;/li&gt;
&lt;li&gt;🇸🇪 &lt;strong&gt;Sweden (PTS)&lt;/strong&gt; — Proactive on IoT and consumer devices.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Non-compliance found anywhere = Safety Gate notification = EU-wide market withdrawal.&lt;/p&gt;




&lt;h2&gt;
  
  
  RED Delegated Act vs CRA
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Aspect&lt;/th&gt;
&lt;th&gt;RED Delegated Act&lt;/th&gt;
&lt;th&gt;CRA&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Applies from&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;August 1, 2025&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;December 11, 2027&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Scope&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Internet-connected radio equipment&lt;/td&gt;
&lt;td&gt;All products with digital elements&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SBOM required&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;Yes&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Vulnerability reporting&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;Yes (24h to ENISA from Sep 2026)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;EN 18031 compliance = hardware security foundation for CRA readiness in 2027. But CRA adds SBOM, vulnerability management, and lifecycle obligations on top.&lt;/p&gt;




&lt;h2&gt;
  
  
  Pre-August Checklist
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Hardware:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;[ ] Secure Boot: hardware-enforced chain implemented&lt;/li&gt;
&lt;li&gt;[ ] Key storage SSM: TrustZone + key service, Secure Element, OTP/eFuse, or software-based with documented risk justification in Technical File&lt;/li&gt;
&lt;li&gt;[ ] Anti-rollback: hardware-enforced version tracking confirmed&lt;/li&gt;
&lt;li&gt;[ ] Default password: unique per-device or first-use forced change&lt;/li&gt;
&lt;li&gt;[ ] TRNG: hardware random number generator confirmed&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Documentation:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;[ ] Technical File updated with EN 18031-x test evidence&lt;/li&gt;
&lt;li&gt;[ ] Declaration of Conformity references Articles 3.3(d)(e)(f)&lt;/li&gt;
&lt;li&gt;[ ] EN 18031 conformity assessment completed (verify if specific clauses trigger notified body requirement)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If hardware gaps exist today — you have a board respin decision. Manufacturing lead times make August 2025 very close.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Vladimir Vician — Founder @ &lt;a href="https://inovasense.com" rel="noopener noreferrer"&gt;Inovasense&lt;/a&gt;&lt;/em&gt;&lt;br&gt;
&lt;em&gt;10+ years embedded hardware. We help EU manufacturers navigate CRA, RED and CE marking — from silicon selection to Technical File.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>embedded</category>
      <category>security</category>
      <category>iot</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>We built a free CRA compliance scorer into a silicon advisor. Here's what we learned.</title>
      <dc:creator>Vladimir Vician</dc:creator>
      <pubDate>Tue, 03 Mar 2026 04:45:00 +0000</pubDate>
      <link>https://dev.to/vladimir_vician/we-built-a-free-cra-compliance-scorer-into-a-silicon-advisor-heres-what-we-learned-4bk0</link>
      <guid>https://dev.to/vladimir_vician/we-built-a-free-cra-compliance-scorer-into-a-silicon-advisor-heres-what-we-learned-4bk0</guid>
      <description>&lt;p&gt;A client came to us four months into PCB layout with a problem.&lt;/p&gt;

&lt;p&gt;They'd chosen STM32F4. Solid MCU, team knew it, reasonable price. Then compliance &lt;br&gt;
review hit: no hardware Secure Boot. No TrustZone. No hardware key storage.&lt;/p&gt;

&lt;p&gt;Wi-Fi connected industrial gateway. EU market. CRA scope. Wrong chip — not a bad &lt;br&gt;
chip, wrong chip for this use case.&lt;/p&gt;

&lt;p&gt;Board spin: €40,000. Timeline impact: five months.&lt;/p&gt;

&lt;p&gt;I've been in embedded hardware for over 10 years. That conversation happens more &lt;br&gt;
than it should. So we built something to catch it earlier.&lt;/p&gt;




&lt;h2&gt;
  
  
  The regulatory context (skip if you know CRA)
&lt;/h2&gt;

&lt;p&gt;EU Cyber Resilience Act enforcement: &lt;strong&gt;September 2026&lt;/strong&gt;.&lt;br&gt;&lt;br&gt;
RED Delegated Act (Wi-Fi, BT, cellular products): &lt;strong&gt;August 2025 — already in effect.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Both have hardware implications that can't be patched in firmware:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Hardware Secure Boot (silicon-level, not software)&lt;/li&gt;
&lt;li&gt;Hardware key storage (Secure Element or TrustZone — flash keys aren't compliant)&lt;/li&gt;
&lt;li&gt;Per-device unique credentials (needs manufacturing provisioning infrastructure)&lt;/li&gt;
&lt;li&gt;Anti-rollback protection (hardware monotonic counters)&lt;/li&gt;
&lt;li&gt;Vulnerability disclosure policy before market entry&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Most teams pick silicon based on cost and familiarity. Compliance gaps show up later, &lt;br&gt;
when changing them is expensive.&lt;/p&gt;




&lt;h2&gt;
  
  
  What we built — and what we were honest about upfront
&lt;/h2&gt;

&lt;p&gt;The &lt;a href="https://inovasense.com/tools/mcu-vs-mpu" rel="noopener noreferrer"&gt;MCU vs MPU Architecture Advisor&lt;/a&gt; &lt;br&gt;
was built with a specific and limited scope: &lt;strong&gt;fast orientation, not a compliance report.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;At the start of a project — before architecture locks, before BOM drafts — you &lt;br&gt;
don't need 40 pages. You need a 30-second answer to: &lt;em&gt;"Is this silicon direction &lt;br&gt;
sane for EU market? What should I be worried about?"&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;That's what it does. Nothing more.&lt;/p&gt;

&lt;p&gt;It won't replace a qualified embedded engineer or a formal CRA gap analysis. &lt;br&gt;
But it asks the right questions at the moment it's cheapest to change the answer.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What it returns for a plain-English project description:&lt;/strong&gt;&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Dimension&lt;/th&gt;
&lt;th&gt;Output&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Architecture verdict&lt;/td&gt;
&lt;td&gt;MCU / MPU / Crossover / FPGA + confidence %&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Suggested silicon&lt;/td&gt;
&lt;td&gt;Specific chips with 🇪🇺 EU origin flag&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Supply chain risk&lt;/td&gt;
&lt;td&gt;Non-EU silicon exposure warning&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;CRA risk&lt;/td&gt;
&lt;td&gt;HIGH / MEDIUM / LOW + specific gaps&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;BOM complexity&lt;/td&gt;
&lt;td&gt;Upstream dependency estimate&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Engineering rationale&lt;/td&gt;
&lt;td&gt;Shareable with your team&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h3&gt;
  
  
  How CRA Article 13 maps to silicon
&lt;/h3&gt;

&lt;p&gt;The hardest part of building this was translating regulatory language into &lt;br&gt;
selection criteria:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;CRA Requirement&lt;/th&gt;
&lt;th&gt;What it means for silicon&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Secure by default&lt;/td&gt;
&lt;td&gt;Unused interfaces disabled at production&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Cryptographic integrity&lt;/td&gt;
&lt;td&gt;Hardware Root of Trust, full Secure Boot chain&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Unique device identity&lt;/td&gt;
&lt;td&gt;eFuse or Secure Element provisioning&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Data at rest confidentiality&lt;/td&gt;
&lt;td&gt;Hardware key storage — not flash&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Lifetime update support&lt;/td&gt;
&lt;td&gt;OTA with anti-rollback&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  Three projects — actual outputs
&lt;/h2&gt;

&lt;h3&gt;
  
  
  🌿 Laser weeding robot
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;Battery-powered, galvo control, 4G logging, IP65, EU Machinery Directive + GPSR&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;MCU — 91% confidence&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Chip: STM32H7 (STMicroelectronics, 🇪🇺 Switzerland/Italy)&lt;br&gt;&lt;br&gt;
CRA: &lt;strong&gt;MEDIUM&lt;/strong&gt; — Secure Boot capable, but provisioning infrastructure needed&lt;br&gt;&lt;br&gt;
Supply chain: 🟢 EU-origin&lt;/p&gt;

&lt;h3&gt;
  
  
  🎙 Edge AI mic array
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;7 mics, 360° beamforming, on-device wake word + speaker ID, BLE 5.3, EU RED + CRA&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Crossover/MPU — 87% confidence&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Chips: NXP i.MX RT1170 or i.MX 8M&lt;br&gt;&lt;br&gt;
CRA: &lt;strong&gt;HIGH&lt;/strong&gt; — audio = personal data under EN 18031-2, full privacy architecture needed&lt;br&gt;&lt;br&gt;
Supply chain: ⚠ NXP Netherlands 🇪🇺, fab Taiwan&lt;/p&gt;

&lt;h3&gt;
  
  
  🚁 Drone AI compute
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;YOLOv8 on dual cameras at 30fps, no cloud, Wi-Fi 6, GPS log, CE + RED&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;FPGA — 78% confidence&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Chips: AMD Xilinx Kria K26, Intel Agilex&lt;br&gt;&lt;br&gt;
CRA: &lt;strong&gt;HIGH&lt;/strong&gt; — custom bitstream = non-standard update pathway, no EU-origin FPGA at this tier&lt;br&gt;&lt;br&gt;
Supply chain: 🔴 US-origin&lt;/p&gt;




&lt;h2&gt;
  
  
  What the results taught us
&lt;/h2&gt;

&lt;p&gt;The FPGA recommendation surprises people most. Default assumption is MCU or MPU.&lt;br&gt;&lt;br&gt;
But 30fps inference on dual cameras with hard latency bounds — the parallelism &lt;br&gt;
math wins.&lt;/p&gt;

&lt;p&gt;EU silicon coverage is decent at MCU-class. STMicro (🇨🇭), Infineon (🇩🇪), &lt;br&gt;
NXP (🇳🇱) cover most use cases. At FPGA performance tier, EU-origin doesn't &lt;br&gt;
exist yet. That gap matters for programs with sovereignty requirements.&lt;/p&gt;

&lt;p&gt;CRA risk is architecture-level, not just chip-level. A drone on custom FPGA &lt;br&gt;
logic has fundamentally different vulnerability disclosure challenges than an MCU &lt;br&gt;
on RTOS. The tool tries to flag that distinction.&lt;/p&gt;




&lt;h2&gt;
  
  
  Try it
&lt;/h2&gt;

&lt;p&gt;Describe your project — the more specific the better. Power budget, interfaces, &lt;br&gt;
OS requirements, EU regulatory scope. Vague input = generic output.&lt;/p&gt;

&lt;p&gt;👉 &lt;strong&gt;&lt;a href="https://inovasense.com/tools/mcu-vs-mpu" rel="noopener noreferrer"&gt;inovasense.com/tools/mcu-vs-mpu&lt;/a&gt;&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Free. No email. No sign-up.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;One last thing:&lt;/strong&gt; this is intentionally basic. The goal was never comprehensiveness —&lt;br&gt;
it was speed. A 30-second check that catches the most common expensive mistakes &lt;br&gt;
before they compound. If your project needs deeper analysis, that's what a &lt;br&gt;
professional review is for. But most projects just need the right questions asked &lt;br&gt;
early. That's what this does.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;— Vladimir Vician, Founder @ &lt;a href="https://inovasense.com" rel="noopener noreferrer"&gt;Inovasense&lt;/a&gt;&lt;/em&gt;&lt;br&gt;&lt;br&gt;
&lt;em&gt;10+ years in embedded hardware. We help EU manufacturers navigate CRA, RED, and CE marking.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>iot</category>
      <category>embedded</category>
    </item>
  </channel>
</rss>
