Comment by baxuz
4 hours ago
Same as with NFC credit cards and similar auth mechanisms. You need hardware and OS-backed encryption that is tamper-proof.
4 hours ago
Same as with NFC credit cards and similar auth mechanisms. You need hardware and OS-backed encryption that is tamper-proof.
No comments yet
Contribute on Hacker News ↗