by admin1 | Aug 7, 2024 | purism
When smartphones first emerged in the early 2000s, the attack surface was relatively small. Devices were primarily used for Personal Information Management (PIM) such as calls, texts, email, calendaring, and basic internet browsing. However, the landscape changed...
by admin1 | Aug 1, 2024 | purism
The Importance of a Hardware Root of Trust for Smartphones In today’s connected world, smartphones have become an integral part of our daily lives, serving as personal assistants, communication devices, and gateways to the digital world. This is no different for...
by admin1 | Jul 30, 2024 | purism
Securing the Supply Chain A compromised component, whether it’s a backdoor in a chipset or a tainted software update, can unravel the entire security architecture of a device. It’s like a house with a gaping hole in the foundation. No amount of locks on the doors will...