Open cybertunnel opened 1 year ago
Looks like if you are monitoring the logs, you could see the recovery key that gets issued and could lead to an adversary to be able to pull it and unlock the drive if offline.
Looks like if you are monitoring the logs, you could see the recovery key that gets issued and could lead to an adversary to be able to pull it and unlock the drive if offline.