{"_id":"BkSfbHBwMYdJtWhrB","bibbaseid":"blog-hackinghardwaresecuritymodulesschneieronsecurity","author_short":["Blog, S."],"bibdata":{"bibtype":"misc","type":"misc","title":"Hacking Hardware Security Modules - Schneier on Security","url":"https://www.schneier.com/blog/archives/2019/06/hacking_hardwar.html","urldate":"2019-06-29","author":[{"firstnames":["Schneier"],"propositions":[],"lastnames":["Blog"],"suffixes":[]}],"bibtex":"@misc{schneier_blog_hacking_nodate,\n\ttitle = {Hacking {Hardware} {Security} {Modules} - {Schneier} on {Security}},\n\turl = {https://www.schneier.com/blog/archives/2019/06/hacking_hardwar.html},\n\turldate = {2019-06-29},\n\tauthor = {Schneier Blog},\n}\n\n","author_short":["Blog, S."],"key":"schneier_blog_hacking_nodate","id":"schneier_blog_hacking_nodate","bibbaseid":"blog-hackinghardwaresecuritymodulesschneieronsecurity","role":"author","urls":{"Paper":"https://www.schneier.com/blog/archives/2019/06/hacking_hardwar.html"},"metadata":{"authorlinks":{}},"downloads":0,"html":""},"bibtype":"misc","biburl":"https://bibbase.org/zotero/bxt101","dataSources":["Wsv2bQ4jPuc7qme8R"],"keywords":[],"search_terms":["hacking","hardware","security","modules","schneier","security","blog"],"title":"Hacking Hardware Security Modules - Schneier on Security","year":null}