(no title)
jpk | 10 months ago
This depends pretty heavily on your threat model. You're right that a device like this is exceedingly unlikely to get exploited by attackers casting a wide net against common vulnerabilities. But an attacker targeting you-in-particular would love to learn you've put ancient hardware and/or software on the network.
bluGill|10 months ago
jpk|10 months ago