• rtxn@lemmy.world
    link
    fedilink
    English
    arrow-up
    15
    ·
    7 months ago

    The difference is that the firmware presents a tiny attack surface. You can’t social-engineer machine code, or use an unsecured access point to gain entry.