Email or username:

Password:

Forgot your password?
Top-level
jntesteves

@whynothugo @Mer__edith There is no such thing as read-only access to a computer. To read and exfiltrate data, you must have control of the machine. Control is full access, the terms are used interchangeably.

1 comment
Hugo 雨果

@jntesteves An attacker might have access to backups, or might be able to run code as an unprivileged user. These two (and countless others) scenarios grant an attacker read data without being even close to "full access".

Go Up