• ipp0@sopuli.xyz
      link
      fedilink
      English
      arrow-up
      1
      ·
      3 hours ago

      Do you have a source for how often it happens or is this conjecture? I guess this would most often happen through supply chain attacks or physical access, the first not being all that common in my understanding and the latter not being a typical threat model for a home computer. But if you have a source explaining what actually happens, I would love to read it.