top | item 37175909 (no title) throwaway03626 | 2 years ago Another scenario is a large office. If a user leaves their desk to get a coffee, an attacker could walk up and get access. Of course, in that case they could also install key loggers, MTM software etc. so they will get access to anything they want. discuss order hn newest No comments yet.
No comments yet.