• @[email protected]
    link
    fedilink
    English
    138 months ago

    It is common for security first infrastructures to put machines inside a local network without internet access and just connect a “bridge” pc with internet access to them for management or retriving data.

    The vulnerability issue here is if the bridge pc runs Windows. Would be the weakest ring in the chain.