If it’s a secure enough environment, I imagine that there will be monitoring on the device, and the moment a hub shows up that’s not supposed to be there, or any other USB device tree that doesn’t match the approved list, , alarm bells ought to go off. If it’s valuable enough; the attack would be to use a passive device picking up leaky signals on the wire, or even hidden camera watching screen/keyboard.
This Pickle (lemmy.world)
Tech workers - what did your IT Security team do that made your life hell and had no practical benefit?
One chestnut from my history in lottery game development:...