Supply-chain vulnerability is no different than a software vuln, if it looks exploitable it should be patched regardless of if Bloomberg can show you a photo of an attack in the wild.
There are a lot of these soft underbellies around, like the fact your browser trusts CAs from potential adversaries, people walking around with phones whose firmware is entirely controlled by potential adversaries. It's painful to think about what would happen should a war ever break out.
There are a lot of these soft underbellies around, like the fact your browser trusts CAs from potential adversaries, people walking around with phones whose firmware is entirely controlled by potential adversaries. It's painful to think about what would happen should a war ever break out.