• Alex
    link
    fedilink
    arrow-up
    4
    ·
    4 days ago

    Looks like they did well. All of the attacks required physical access and glitching the chip. That should be good enough for a lot of use cases.