Smartphones, tablets and other mobile devices con- tain cryptographic keys that protect payments, VPN/network connections and on-device flash memory. Although some smartphones and other devices contain countermeasures, many do not and can be easily compromised. Even a simple radio can tune into the radio frequency emissions from mobile devices and gather side channel information. In some cases,...
» read more