Tags
android app auditing authorization authorization-timer authorizationresponse ble bluetooth-classic bluetooth-low-energy cloning confudion crypto-counter denial-of-service drop evil-twin hardware improvement information-disclosure instructions j2me key key-deletion keycard keydrop nfc paak palm-os phonekey privilege-escalation proto protobuf protocol-buffers rfid security tempa tempara tesla tuning vcsec vulnerability