• Alex@lemmy.ml
    link
    fedilink
    arrow-up
    4
    ·
    17 days ago

    Looks like they did well. All of the attacks required physical access and glitching the chip. That should be good enough for a lot of use cases.