• 0xD@infosec.pub
      link
      fedilink
      English
      arrow-up
      0
      arrow-down
      1
      ·
      1 month ago

      That doesn’t really do anything. Attackers need local access to the device to get the database itself. Chances are, they’ll get the key right with it.