• MotoAsh@lemmy.world
    link
    fedilink
    arrow-up
    1
    arrow-down
    1
    ·
    23 hours ago

    And how do they get the camera? You could make the same exact claims about SSH being useless because “if an attacker gets the key, it’s over!”

    NO SHIT!!