So, the problem with USB tokens that we basically have two choices: - Unauditable black boxes built on *supposedly* more secure ICs that require NDAs to develop for - Open and auditable, but definitely pwnable off the shelf microcontrollers. Which poison do you prefer?
-
-
Also, you're using the "security by obscurity" argument, which, even if the security is actually good, has been thoroughly discredited in the security industry, and silicon isn't a special case. I hope I don't need to give you a lecture on this, it's common knowledge.
-
I'm just saying they are protecting their IPs, I'm not saying it's a good thing...
- Show replies
New conversation -
-
-
If you have already developped on secure element, you know it's more complex than that...
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
This Tweet is unavailable.
-
No, making the documentation non-public means people aren't going to find your mistakes and flaws earlier, thus ensuring that when you *do* get pwned, there is a huge install base of vulnerable products. Security by obscurity does. Not. Work. Don't try to claim it does.
End of conversation
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.