Hardware security is becoming increasingly important as our lives rely more on embedded devices. Hardware attacks are cheap, and increasingly prevalent. We’ll discuss the hardware attack on the Apple AirTag, where full access to the device was gained. We’ll also cover various classes of attacks, and what techniques are available to make attacks less likely to succeed. This presentation will show embedded system developers where the risks are, and how to start addressing them.