• SomeLemmyUser@discuss.tchncs.de
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    4 months ago

    The device needs to be physically accessed and modified and then unlocked in order to exploit it.

    Exactly the service the company offers

    Yes it is a vulnerability but with those steps you could also just solder a keylogger to the keyboard.

    This is not a hot take at all!

    Sure thing, it is equally hard to confiscate/steal a device (if the user notices you just shrug) and open it no user input required And Stealing the device without the user noticing Solder a keylogger, get it back to the user without them noticing and having them put in their password, then steal the device again so you can use said passwort

    I totally agree