The Evolution of Hardware Isolation for Smartphones

Published on October 7, 2021

To keep a smartphone’s most sensitive processes and data protected in case of attack, phone makers have turned to isolation via hardware, first through virtualization on a single processor and then through a dedicated security chip. But as advanced hackers continue to look for ways to break this hardware isolation, a shift in tactics may be required to keep the information of security-conscious users safe.

Previous
Previous

The Hijacking of Smartphone Cameras and Microphones

Next
Next

Route Fifty: For Smartphone Makers, Security Is a Matter of Economics