Comment on Is using MicroSD cards a good way to store data that you can destroy quickly incase an adversary is about to seize control of it?

<- View Parent
HelixDab2@lemm.ee ⁨3⁩ ⁨weeks⁩ ago

The first two links that you posted don’t appear to cover electron microscopy at all. The last appears to show a potential method of attack–which is noted in the link that I posted–but does not seem to show that it’s actually been successfully implemented. (“Using SEM operator-free acquisition and standard image processing technique we demonstrate the possible [emphasis added] automating of such technique over a full memory. […] The technique is a first step [emphasis added] for reverse engineering secure embedded systems.”)

source
Sort:hotnewtop