Resident PulserB to Pulse of TruthEnglish · 10 months agoHow to give Windows Hello the finger and login as someone on their stolen laptopgo.theregister.comexternal-linkmessage-square2fedilinkarrow-up15arrow-down10file-text
arrow-up15arrow-down1external-linkHow to give Windows Hello the finger and login as someone on their stolen laptopgo.theregister.comResident PulserB to Pulse of TruthEnglish · 10 months agomessage-square2fedilinkfile-text
minus-squareRenegadelinkfedilinkEnglisharrow-up1·edit-210 months agoThese are hardware attacks that require physical accesss. Its not super surprising that physical access allows for exploit, given the state hardware is in today.
These are hardware attacks that require physical accesss. Its not super surprising that physical access allows for exploit, given the state hardware is in today.