by 0x402DF854 on 6/29/20, 11:20 PM with 3 comments
by olliej on 6/30/20, 6:26 AM
If the key could be recovered with a corrupt firmware, then the SEP would be open to an attack to extract the keys by forcing firmware corruption and then using that as a path to compromising the device.