翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Sunday, 08-Sep-2024 04:33:23 JST
-
Embed this notice
翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Sunday, 08-Sep-2024 04:33:23 JST 翠星石 @feld If there is physical access, but access time is limited, then a competent attacker will place a listening/recording device close enough and promptly leave, wait for you to enter any password(s), with the listening device capturing them and then they'll come back later and simply unlock the device with the password.