Resident PulserB to Pulse of TruthEnglish · 1 year agoHow to give Windows Hello the finger and login as someone on their stolen laptopgo.theregister.comexternal-linkmessage-square2fedilinkarrow-up15arrow-down10file-text
arrow-up15arrow-down1external-linkHow to give Windows Hello the finger and login as someone on their stolen laptopgo.theregister.comResident PulserB to Pulse of TruthEnglish · 1 year agomessage-square2fedilinkfile-text
minus-squareRenegadelinkfedilinkEnglisharrow-up1·edit-211 months agoThese are hardware attacks that require physical accesss. Its not super surprising that physical access allows for exploit, given the state hardware is in today.