logoalt Hacker News

ACCount37yesterday at 8:31 PM1 replyview on HN

Every other exploit chain that the likes of Cellebrite use to pry the user data encryption keys out of TZ starts in some shitty DRM module.


Replies

gruezyesterday at 8:32 PM

source?