Researchers showed how attackers could pull encryption keys, recover the PIN, and access sensitive data from affected devices.