-
@octal That's probably fair, but I don't know if others have live remote access capability as a potential attack surface (besides unintentional channels through various services...). If there is any public documentation along those lines on other makers, please let me know.