Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Physical access always has been much harder to protect against than anything else.

If someone is trusted to get access to the actual device then it's pretty much game over. Do you check the keyboard cables for key-capture hardware? Do you check for all the other nefarious devices? Do you check your OS has not been tampered with?



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: