Security ... think about it!
Tarnovsky used a highly detailed (and time consuming) process of analyzing the Infineon SLE 66 CL PE chip using an electron microscope to identity the core of the chip and create a “bridge map” that enabled him to bypass the chip’s integrated tamper-prevention measures using tiny needles to tap the system’s data bus. This was after soaking the chips in acids and rust removers to remove the chip’s shells and delicate mesh wiring. The process took Tarnovsky about nine months, but once it was done he had access to not only any data on the computer, but to critical information that could be used to create counterfeit chips.