Chip-offs and J-Tag port access are becoming common method of extracting handheld information. Find an article on one of these methods, summarize the article in your own words, and discuss why these methods are being used. Include the link to the article.
Note must be 300 words