I’ve worked on several such systems for large companies; properly designed ones are either offline (manual) or at a minimum air-gapped; in all casss quorum of physical employees. Not online like let’s encrypt.
-
-
Your argument i assume is hidden vuln insertion?
-
That would be one way, sure. I mean, an attacker could get themselves the firmware blob the FBI wanted by only compromising infrastructure that exists today.
- 36 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.