Of course it still makes sense to defend yourself, but if you have any idea how software functions, it should be obvious that the number of known and unknown vulnerabilities in our devices number in the thousands and a lot of them are and remain exploited by all kinds of organizations.

Why would any device that you own not be fully infiltrated if a mid to high level service had an interest in it?

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.