Understanding Insecure Data Storage in IoT Smart Lock Companion App
In our previous blog, we explored the hidden risks in IoT companion apps and their three-tiered architecture. We identified key vulnerabilities, including insecure communications, hard-coded