top | item 43330533

(no title)

Jochim | 11 months ago

I agree! Your system is already heavily compromised if this is a problem for you.

I think the real problem lies in a lack of visibility into the state of the device. A compromised dongle could easily be transferred between machines. What we need is to make obvious what the machine/device is doing.

discuss

order