How to give Windows Hello the finger and login as someone on their stolen laptop

  • Renegade
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    10 months ago

    These are hardware attacks that require physical accesss. Its not super surprising that physical access allows for exploit, given the state hardware is in today.