The highly secure device could have been exploited, were it not for the responsible disclosure by a security researcher.
Any modern device is made up of multiple hardware and software components, any one of wh...
↧