#37

#36

#35

#34

#33

#32

#31

#30

#29

#28

Samply #1

#27

#26

Entity #2

Entity #1

#25

#23

#21

How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data