The device needs to be physically accessed and modified and then unlocked in order to exploit it.
Exactly the service the company offers
Yes it is a vulnerability but with those steps you could also just solder a keylogger to the keyboard.
This is not a hot take at all!
Sure thing, it is equally hard to confiscate/steal a device (if the user notices you just shrug) and open it no user input required
And
Stealing the device without the user noticing
Solder a keylogger, get it back to the user without them noticing and having them put in their password, then steal the device again so you can use said passwort
Exactly the service the company offers
This is not a hot take at all!
Sure thing, it is equally hard to confiscate/steal a device (if the user notices you just shrug) and open it no user input required And Stealing the device without the user noticing Solder a keylogger, get it back to the user without them noticing and having them put in their password, then steal the device again so you can use said passwort
I totally agree