- Improving Tamper Evidence for Hardware Wallets Physical attacks on computing hardware are rare, but can have devastating impact. Physical tampering with a device can include adding or removing electronics to immediately exfiltrate data or to surreptitiously change the device’s behavior while the owner is using it post-tamper. Short of modification, an attacker can simply swap out one device for an identical […]