• soljin@lemm.ee
    link
    fedilink
    English
    arrow-up
    32
    ·
    1 year ago

    This is such a non story. It requires physical access to unattended devices and a sophisticated attack.