• soljin@lemm.ee
    link
    fedilink
    English
    arrow-up
    29
    ·
    11 months ago

    This is such a non story. It requires physical access to unattended devices and a sophisticated attack.