The other big lesson here is that using a weak PIN to protect a strong key is difficult at best.
@stribika @mattblaze How do you implement a secure delay that can't be bypassed? Without early wipe, attacker has incentive to experiment.
-
-
@stribika@mattblaze Yes, clock seems like an external input that could be forged.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.