
CD36: privacy focused open source routers with @jamesob and @_k3tan
Citadel Dispatch
Supply Chain Attacks - What's the Bottom Line?
There's a lot of disparate evidence that nation states in particular do engage in supply attacks. You know, we know from the Snowden leaks, for example, that supply chain attacks are fairly commonly used. A router that you could be handed from your ISP may well have a back door on there. And to most people, I would say, you don't even include that in your threat model.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.