The evaluation of an embedded products end-to-end security can often be greatly improved by examining data communication at the circuit level via inter-chip communication as data passes thru an embedded device. So during this presentation we will be exploring inter-chip communication concepts. Focusing on mapping circuit layouts, capturing and decoding communication methodologies, and evaluation of end-to-end security concepts on IoT bridging devices used for remote Internet access to devices leveraging none routable Protocols. With the goals of identifying and understanding: The decoding of Inter-chip communication, End-to-End security validation, Identification of potential attack vectors & vulnerabilities, Device internal command structure, Weaponization of bridge devices