Recent results have shown the usefulness of tamper-proof hardware tokens as a setup assumption for building UC-secure two-party computation protocols, thus providing broad security guarantees and allowing the use of such protocols as buildings blocks in the modular design of complex cryptography protocols. All these works have in common that they assume the tokens to be completely isolated from their creator, but this is a strong assumption. In this work we investigate the feasibility of cryptographic protocols in the setting where the isolation of the hardware token is weakened.We consider two cases: (1) the token can relay messages to its creator, or (2) the creator can send messages to the token after it is sent to the receiver. We provide a detailed characterization for both settings, presenting both impossibilities and information-theoretically secure solutions.We first show that the existing solution of Döttling, Kraschewski and Müller-Quade [13] for OTM with 2 tokens can be modified to UC-realize OTM with abort. Then we show that using a single token, it is impossible to obtain an information-theoretically secure OTM protocol, if Goliath can send messages to the token. We sketch how a information-theoretically UC-secure OT protocol from a single token can be obtained and give a construction of a compuationally UC-secure OTM protocol from a single hardware token.The formalization of the ideal functionality for stateful tamper-proof hardware tokens in this section uses a wrapper functionality as in the previous works [20,22,13], but as one-way communication from the token issuer to the token is now allowed, the wrapper functionality needs to be modified to capture this fact. A sender G (Goliath) provides as input to F stateful wrap-owc a deterministic Turing machine T (the token). Note that stateful tokens can be hard-coded with sufficiently long randomness tapes. The receiver D (David) can query F stateful wrap-owc to run T with inputs of his choice and receives the output produced by the token. The current state of T is stored between consecutive queries. In addition, and in order to capture the one-way communication property, we add the possibility of Goliath sending messages to the token, in which case T is run on the received string and changes to a new state. The complete description of the functionality is shown in Figure 3. This model captures the fact that on the one hand