Device behaviour under duress: how secure phones must fail safely in the real world

Loading post...