BenGWeeks on Nostr: I’d love to see a video of the process when using. I previously had the chance to ...
I’d love to see a video of the process when using. I previously had the chance to inspect the physical device and it felt very premium in the hand.
I will need to re-read this to fully digest. My first thoughts are:
(1) Could this be “hacked” between the server and end user in a similar fashion as you outlined with other methods.
(2) What risks are there to the end user if the server itself is hacked?
I will need to re-read this to fully digest. My first thoughts are:
(1) Could this be “hacked” between the server and end user in a similar fashion as you outlined with other methods.
(2) What risks are there to the end user if the server itself is hacked?