Resident PulserB to Pulse of TruthEnglish · 2 years agoHow to give Windows Hello the finger and login as someone on their stolen laptopgo.theregister.comexternal-linkmessage-square2linkfedilinkarrow-up15arrow-down10file-text
arrow-up15arrow-down1external-linkHow to give Windows Hello the finger and login as someone on their stolen laptopgo.theregister.comResident PulserB to Pulse of TruthEnglish · 2 years agomessage-square2linkfedilinkfile-text
minus-squareRenegadelinkfedilinkEnglisharrow-up1·2 years agoThese are hardware attacks that require physical accesss. Its not super surprising that physical access allows for exploit, given the state hardware is in today.