Ben Tasker
@bentasker
@TheBitfi @EV_Stevee @cybergibbons @Teazzdelta OK, so now there's some agreement that the keys can be extracted, lets walk down the path of how. You've mentioned malware, let's call it what it is though - an evil maid attack where someone manages to load tainted firmware. 1/
06 Jul 2019 10:22
2019 Archive