Resident PulserB to Pulse of TruthEnglish · 2 years agoHow to give Windows Hello the finger and login as someone on their stolen laptopgo.theregister.comexternal-linkmessage-square2linkfedilinkarrow-up15arrow-down10file-text
arrow-up15arrow-down1external-linkHow to give Windows Hello the finger and login as someone on their stolen laptopgo.theregister.comResident PulserB to Pulse of TruthEnglish · 2 years agomessage-square2linkfedilinkfile-text
minus-squareRenegadelinkfedilinkEnglisharrow-up1·2 years agoThese are hardware attacks that require physical accesss. Its not super surprising that physical access allows for exploit, given the state hardware is in today.
These are hardware attacks that require physical accesss. Its not super surprising that physical access allows for exploit, given the state hardware is in today.