@chort @wdormann infosec folk here, however I am asking myself the same question - not as in “who cares, who would do this” but moreso “what how where and when does this break stuff leading to potential compromise outside of the obvious FUBAR case for the system itself?” In other words, what specifically is this a precursor to or does this actually keep a system down? I’m certain I’m missing something here or am ignorant of a topic