- From: Watson Ladd <watsonbladd@gmail.com>
- Date: Wed, 17 Jul 2024 16:50:11 -0700
- To: Josh Cohen <joshco@gmail.com>
- Cc: David Schinazi <dschinazi.ietf@gmail.com>, int-area@ietf.org, ietf-http-wg@w3.org
One adversary is willing to devote an entire nuclear submarine to the task. They are more than willing to use existing vulnerabilities in ways that you never hear about because they are good at their jobs. If you use network links to configure your device, and the device goes to the coffeeshop, that coffeeshop gets to configure the device. That's just inherently a bad idea, and always has been. Sincerely, Watson Ladd -- Astra mortemque praestare gradatim
Received on Wednesday, 17 July 2024 23:50:27 UTC