How can you know your phone, PC motherboard or home devices were not compromised before any software was even installed on them? From dubious 'management engines' to exploding pagers, hardware tampering, malicious manufacture and treacherous (defective by design) computing is becoming more common. We talk to Dr. Basel Halak about hardware supply chain verification, tampering countermeasures and how hardware security can work for the end-user too, for example protecting the contents of your stolen phone.