
Solana Fires Back at CertiK, Says Saga Phone Flaw Claims Are ‘Inaccurate’
Solana argues that an attacker would still need the permission of the phone owner to gain entry.
Solana argues that an attacker would still need the permission of the phone owner to gain entry.