• @ricecake@sh.itjust.works
      link
      fedilink
      English
      32 years ago

      That’s a much better example.

      Physical access to the device by a sophisticated attacker is well outside the realm of most people’s risk profile.