• 9point6@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    ·
    1 day ago

    Any machine with which an attacker has had physical access to should be considered compromised

    I don’t imagine trusting any countermeasure close to enough to invalidate that rule