Line 15: |
Line 15: |
| ! Discovered by | | ! Discovered by |
| |- | | |- |
− | | No hardware exploits discovered | + | | No public hardware exploits |
| | | | | |
| | | | | |
Line 36: |
Line 36: |
| ! Discovered by | | ! Discovered by |
| |- | | |- |
− | | No ARM TrustZone exploits discovered | + | | No public ARM TrustZone exploits |
| | | | | |
| | | | | |