One adversary is willing to devote an entire nuclear submarine to the
task. They are more than willing to use existing vulnerabilities in
ways that you never hear about because they are good at their jobs.

If you use network links to configure your device, and the device goes
to the coffeeshop, that coffeeshop gets to configure the device.
That's just inherently a bad idea, and always has been.

Sincerely,
Watson Ladd

-- 
Astra mortemque praestare gradatim

_______________________________________________
Int-area mailing list -- int-area@ietf.org
To unsubscribe send an email to int-area-le...@ietf.org

Reply via email to