Can you tell the difference between a secure hardware token and a fake secure hardware token?
I suppose if you try to extract the secret key and the token destroys it, it's pretty secure. Of course, you just lost all your money. I can't think of a non-destructive test.
I suppose if you try to extract the secret key and the token destroys it, it's pretty secure. Of course, you just lost all your money. I can't think of a non-destructive test.