computer security attack on an unattended device, in which an attacker with physical access alters it in some undetectable way so that they can later access the device, or the data on it
--Agreed Upon Solutions
The discussion does not exist would you like to add the first comment?