Open bunnie opened 5 years ago
The wifi implementation (point of order: wifi stack is in the insecure domain handled by a co-processor, not the enclave) should be able to support MAC spoofing to reduce the traceability of the the betrusted device.
The wifi implementation (point of order: wifi stack is in the insecure domain handled by a co-processor, not the enclave) should be able to support MAC spoofing to reduce the traceability of the the betrusted device.