You can stop there and be pretty accurate. The best we have is air-gapping private systems and trying really hard to secure private networks device to endpoint. As long as there are zero day exploits and well funded nation-states, there will always be back-doors in silicon.
You can stop there and be pretty accurate. The best we have is air-gapping private systems and trying really hard to secure private networks device to endpoint. As long as there are zero day exploits and well funded nation-states, there will always be back-doors in silicon.