How do you apply attacks to complete systems, and how do you test systems you might use in your day-to-day life? In this article, Colin discusses how he confirmed that an access control system he was considering to use doesn’t have a timing attack present