Here is quite a lengthy pdf of so-called decapping methods:
https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-630.html
That should take you to the abstract. A link to the full pdf is at the bottom.
Here are some updates:
https://www.cl.cam.ac.uk/research/security/publications/
I think the answer is simple: Any lock can be picked.
John
https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-630.html
That should take you to the abstract. A link to the full pdf is at the bottom.
Here are some updates:
https://www.cl.cam.ac.uk/research/security/publications/
I think the answer is simple: Any lock can be picked.
John