• ShortN0te
    link
    fedilink
    arrow-up
    1
    ·
    5 months ago

    The device needs to be physically accessed and modified and then unlocked in order to exploit it.

    Yes it is a vulnerability but with those steps you could also just solder a keylogger to the keyboard.

    Similar outcome.

    • SomeLemmyUser@discuss.tchncs.de
      link
      fedilink
      arrow-up
      1
      arrow-down
      1
      ·
      edit-2
      5 months ago

      The device needs to be physically accessed and modified and then unlocked in order to exploit it.

      Exactly the service the company offers

      Yes it is a vulnerability but with those steps you could also just solder a keylogger to the keyboard.

      This is not a hot take at all!

      Sure thing, it is equally hard to confiscate/steal a device (if the user notices you just shrug) and open it no user input required And Stealing the device without the user noticing Solder a keylogger, get it back to the user without them noticing and having them put in their password, then steal the device again so you can use said passwort

      I totally agree