• taanegl@lemmy.ml
    link
    fedilink
    arrow-up
    1
    ·
    1 year ago

    Which part of “not with the current hardware” didn’t you understand? How did those hackers gain access?! WiFi and Bluetooth, as well as some enterprise system shellacked on top of it.

    I respect Tom Scott, but that kind of absolutism isn’t anything else than a dismissal. But yes, don’t trust these IT companies. They are trash, their licenses are trash and their code is trash.

    If that’s the basis he’s going off, he is right, but that doesn’t dismiss the point I was trying to make - which completely escaped you.