@Edent Fascinating experiment!
One random thought in response: Yubico took a lot of heat for making their key firmware read-only, but "nothing can modify the firmware" has its own security properties for some threat models.
@Edent Fascinating experiment!
One random thought in response: Yubico took a lot of heat for making their key firmware read-only, but "nothing can modify the firmware" has its own security properties for some threat models.