(no title)
mrsssnake | 1 month ago
You mean the attacker having a physical access to the device plugging in some USB or UART, or the hacker that downgraded the firmware so it can use the exploit in older version to downgrade the firmware to version with the exploit?
QuiEgo|1 month ago
c22|1 month ago
mrsssnake|1 month ago
mschuster91|1 month ago
... which describes US border controls or police in general. Once "law enforcement" becomes part of one's threat model, a lot of trade-offs suddenly have the entire balance changed.
mrsssnake|1 month ago