Since this "attack" vector requires physical access to the computer, is it a valid problem? One side of IT is physical security of equipment so..... I'm just asking as I'm not a hardcore nuts and bolts deep inside the processor type.?
Since this "attack" vector requires physical access to the computer, is it a valid problem? One side of IT is physical security of equipment so..... I'm just asking as I'm not a hardcore nuts and bolts deep inside the processor type.?
Biting the hand that feeds IT © 1998–2022