You misunderstand.
I was giving you suggestions for small experiments to identify what vectors
of attack might be in play.
the question of protecting the supply chain from component to end user is
a different question,not relevant in this thread.
You misunderstand.
I was giving you suggestions for small experiments to identify what vectors
of attack might be in play.
the question of protecting the supply chain from component to end user is
a different question,not relevant in this thread.