You must log in or register to comment.
Looks like they did well. All of the attacks required physical access and glitching the chip. That should be good enough for a lot of use cases.
Looks like they did well. All of the attacks required physical access and glitching the chip. That should be good enough for a lot of use cases.