But isn’t it problematic that the secure element can be accessed/extracted from in the first place? If this is possible, couldn’t a malicious actor do the same thing but without the encryption?

Reply to this note

Please Login to reply.

Discussion

No replies yet.