I am really puzzled and scared by many modern “security” consultants who claim the smartphone to be the next security device or even my identification object. Knowing that the smartphone has more cores than most desktop computers, is connected faster to the internet (thanks to LTE) than most land line […]
Token Security
1 post