I wonder if there is an attack vector without a compromised firmware

Reply to this note

Please Login to reply.

Discussion

From what I read it doesn’t but still the ingenuity behind the take is intriguing. Hardware and software Devs have to stay one step ahead of the hackers. Crazy