One of the oldest maxims in hacking is that once an attacker has physical access to a device, its game over for its security. The basis is sound. It doesnt matter how locked down a phone, computer, or other machine is; if someone intent on hacking it gains the ability to physically manipulate it, the chances of success are all but guaranteed. In the age of cloud computing, this widely accepted principle is no longer universally true. Some of the worlds most sensitive information—health record

Read the full article at Arstechnica