Is using MicroSD cards a good way to store data so that you can destroy quickly incase an adversary is about to seize control of it?
HelixDab2 @ HelixDab2 @lemm.ee Posts 1Comments 2,373Joined 2 yr. ago
HelixDab2 @ HelixDab2 @lemm.ee
Posts
1
Comments
2,373
Joined
2 yr. ago
The first two links that you posted don't appear to cover electron microscopy at all. The last appears to show a potential method of attack--which is noted in the link that I posted--but does not seem to show that it's actually been successfully implemented. ("Using SEM operator-free acquisition and standard image processing technique we demonstrate the possible [emphasis added] automating of such technique over a full memory. [...] The technique is a first step [emphasis added] for reverse engineering secure embedded systems.")