The gap between the people demanding these systems and those who design it it is so large, it’s vulnerable to corruption in infinite ways, let’s be honest.
It underscores how important cybersecurity is in mobile, IoT and Wi-Fi systems. A few critical exploits chained together is all it takes for physical surveillance or bio-sensing[1].
A 2007 NSA hacking toolkit catalog leaked by Snowden[2] shows what state-of-the-art was 18 years ago. Just imagine what a remote attacker can do with today's commercial hardware.
It underscores how important cybersecurity is in mobile, IoT and Wi-Fi systems. A few critical exploits chained together is all it takes for physical surveillance or bio-sensing[1].
A 2007 NSA hacking toolkit catalog leaked by Snowden[2] shows what state-of-the-art was 18 years ago. Just imagine what a remote attacker can do with today's commercial hardware.
[1]https://www.mdpi.com/1424-8220/24/7/2111
[2]https://www.eff.org/document/20131230-appelbaum-nsa-ant-cata...