Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

>Imagine an attack in which an attacker gains physical access to your TV and loads malware onto your TV via USB

My threat model doesn’t include attackers that surreptitiously gain access to my home and execute a physical attack against my devices.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: