We have a saying in cybersecurity/infosec: they who own the hardware, own the system.

What they're publicly doing with it isn't the main concern, in my mind; it's that they have hardware level access to these systems.

Comments