View Single Post
brontide's Avatar
Posts: 868 | Thanked: 474 times | Joined on Oct 2007 @ Capital District, NY, USA
#3
These questions are complicated by the fact that the person trying to breach the security might have physical access to the 810, not just someone trying to intercept your communications in a wi-fi cafe or something.
Physical access trumps everything. I can extract almost anything from any system, including passwords, assuming I have physical access.
 

The Following User Says Thank You to brontide For This Useful Post: