• stealth_cookies@lemmy.ca
    link
    fedilink
    English
    arrow-up
    3
    ·
    7 hours ago

    You can greatly reduce the attack surface by limiting device use to specific users or maybe even specific devices that are controlled.