I think this sort of attitude towards hardware devices will massively limit the potential for attacks on our hardware via our ports. We should push for protocols that verify the hardware on the other end is either a known or approved device.
What sort of imaginary attacks are you talking about? Also, removing your ability to use your devices with this device arbitrarily makes this device less "our hardware" and more 'Microsoft's Hardware".
These kind of attacks are pretty rare in general, and for X-Box machines even more so (if they even exist at all). It's not really a huge deal for most people, and locking everything down for everyone is a huge price to pay. It also seems to me that most actors deploying these kind of attacks can bypass these limits them without too much trouble.
If you really want this protection then you can just lock it down yourself.
whelp_24|2 years ago
arp242|2 years ago
If you really want this protection then you can just lock it down yourself.
csense|2 years ago
https://xkcd.com/129/