Then again the hardware device can fail or the secure element can become obsolete and vulnerable to attacks.

Reply to this note

Please Login to reply.

Discussion

1. Depends

2a. Depends

2b. Depends