@TheBitfi@EV_Stevee@cybergibbons@Teazzdelta OK, so now there's some agreement that the keys can be extracted, lets walk down the path of how. You've mentioned malware, let's call it what it is though - an evil maid attack where someone manages to load tainted firmware. 1/