David Craven writes:
>> If the attacker *is* vendor who supplies the proprietary device then they
>> would
>> not have to reverse engineer it.
>
> You can always choose not to apply the vendors update. If for example
> the company you initially trusted with by purchasing their device gets
> boug
> If the attacker *is* vendor who supplies the proprietary device then they
> would
> not have to reverse engineer it.
You can always choose not to apply the vendors update. If for example
the company you initially trusted with by purchasing their device gets
bought by another company or you have
On Sun, Feb 12, 2017 at 11:02:29PM -0800, Maxim Cournoyer wrote:
Hi,
Christopher Howard writes:
> On 02/10/2017 08:31 AM, David Craven wrote:
>> Hi Maxim
>>
>>> +1. I don't see how having blobs helps security at all.
>>
>> Well the problem I wa