• 0xD@infosec.pub
    link
    fedilink
    English
    arrow-up
    0
    arrow-down
    1
    ·
    1 month ago

    That doesn’t really do anything. Attackers need local access to the device to get the database itself. Chances are, they’ll get the key right with it.