
I think it fixes the security threats exposed in: http://blog.azimuthsecurity.com/2013/06/attacking-crypto-phones-weaknesses-in.html
I think it fixes the security threats exposed in: http://blog.azimuthsecurity.com/2013/06/attacking-crypto-phones-weaknesses-in.html