trezor or case have other attack vectors
Oh, what are their weaknesses? I was not aware that a trezor had any ?
I believe people were able to extract private keys by measuring electric noise or something, that's being created by the processor while processing the keys. It really is quite a remarkable method, I don't know how easy it is to apply it, though!