• ipp0@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    2
    ·
    6 hours ago

    Do you have a source for how often it happens or is this conjecture? I guess this would most often happen through supply chain attacks or physical access, the first not being all that common in my understanding and the latter not being a typical threat model for a home computer. But if you have a source explaining what actually happens, I would love to read it.