(no title)
jpk
|
10 months ago
Your entire comment is threat modeling, which is great! But it demonstrates my point: using an old, insecure thing is sometimes obscure enough to fly under the radar of one class of threats, but presents a juicy attack surface for another class of threats. And one's own personal risk for any given class of threats will vary depending on one's circumstances. So the parent comment's unqualified statement of, "security is not a consideration for such devices," isn't quite right.
No comments yet.