A method of protecting technical equipment from unauthorized interference. Protects cryptographic keys and typed PINs. Destroys this data in the event of an unauthorised attempt.