But isn’t it problematic that the secure element can be accessed/extracted from in the first place? If this is possible, couldn’t a malicious actor do the same thing but without the encryption?
But isn’t it problematic that the secure element can be accessed/extracted from in the first place? If this is possible, couldn’t a malicious actor do the same thing but without the encryption?
No replies yet.