AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Supply Chain Attacks - What's the Bottom Line?
There's a lot of disparate evidence that nation states in particular do engage in supply attacks. You know, we know from the Snowden leaks, for example, that supply chain attacks are fairly commonly used. A router that you could be handed from your ISP may well have a back door on there. And to most people, I would say, you don't even include that in your threat model.