Are all elements interconnected? E. G. Is the Bluetooth element connected to the secure storage?

The device has many attack vectors, are there any airgaps in the device to limit something from being compromised?

Reply to this note

Please Login to reply.

Discussion

No replies yet.