If a victim has to give his password, erase his phone, and hand it over, is it still a vulnerability? Dive into our analysis of the Saga mobile's security debate, as we scrutinize Certik's vulnerability claims and examine Saga's bootloader unlocking process.
Share this post
Saga of Saga - Part 1: Unlocking the Debate…
Share this post
If a victim has to give his password, erase his phone, and hand it over, is it still a vulnerability? Dive into our analysis of the Saga mobile's security debate, as we scrutinize Certik's vulnerability claims and examine Saga's bootloader unlocking process.