One adversary is willing to devote an entire nuclear submarine to the task. They are more than willing to use existing vulnerabilities in ways that you never hear about because they are good at their jobs.
If you use network links to configure your device, and the device goes to the coffeeshop, that coffeeshop gets to configure the device. That's just inherently a bad idea, and always has been. Sincerely, Watson Ladd -- Astra mortemque praestare gradatim _______________________________________________ Int-area mailing list -- int-area@ietf.org To unsubscribe send an email to int-area-le...@ietf.org