usb RISK

  • Thread starter Thread starter wAYKOOL
  • Start date Start date
W

wAYKOOL

Is it realistic to assume that someone with access to the
computer in question to think they could in theory
redirect information trasnfered across the USB for them to
exploit to them?
 
wAYKOOL said:
Is it realistic to assume that someone with access to the
computer in question to think they could in theory
redirect information trasnfered across the USB for them to
exploit to them?

Physical Access equals Complete Control.
(caveat: with appropriate knowledge/tools.)

Now - what exactly are you asking about? Can you describe the scenario in
more detail that you are specifically concerned with?
 
Back
Top