Comment by npteljes

Comment by npteljes 2 days ago

0 replies

The context clearly explains what OP means. The meaning is that "This is not something that is achieved via simply hacking a normal device remotely. This is something that is achieved via doing something extra to the device first, and maybe then hacking it remotely."

Another thing is that if we begin to use "hack" for every means of attack and unauthorized access, then the word loses its meaning. There is no supply chain hack, but there is a supply chain attack.