So, this capability already exists and is used already in this way, which is why defense in depth is so important, because we have to always assume any single door or any single vendor is already breached by this sort of technology.

Keyboard shortcuts

j previous speech k next speech