• jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 day ago

    If you have a very sensitive threat model, it can also limit charging to only when the device is off. Which is the most secure form of charging