You must log in or # to comment.
Virtual Private Cutie?
Uwu?
Uwu!
It is common for security first infrastructures to put machines inside a local network without internet access and just connect a “bridge” pc with internet access to them for management or retriving data.
The vulnerability issue here is if the bridge pc runs Windows. Would be the weakest ring in the chain.
Sounds like BBS from back in the day.