miss_brainfarts ,

I could've worded it better, that's for sure.

An attacker needs some form of access to your separate device. That describes it more accurately.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • privacy@lemmy.ml
  • test
  • worldmews
  • mews
  • All magazines