• MotoAsh@lemmy.world
    link
    fedilink
    arrow-up
    1
    arrow-down
    1
    ·
    1 day ago

    And how do they get the camera? You could make the same exact claims about SSH being useless because “if an attacker gets the key, it’s over!”

    NO SHIT!!