The attack, discovered by Ledger security researchers, involves "voltage glitching" and reprogramming a device's microcontroller.
The attack, discovered by Ledger security researchers, involves "voltage glitching" and reprogramming a device's microcontroller.