miss_brainfarts , 3 months ago I could've worded it better, that's for sure. An attacker needs some form of access to your separate device. That describes it more accurately.
I could've worded it better, that's for sure.
An attacker needs some form of access to your separate device. That describes it more accurately.