
WIRED @WIRED
By compromising a single supplier, spies or saboteurs can turn any application, any software update, even their physical equipment into a Trojan horse. https://t.co/t5wovTY4dE — PolitiTweet.org
Created
Mon Jul 26 22:15:01 +0000 2021
Likes
34
Retweets
21
Source
SocialFlow
View Raw Data
JSON DataView on Twitter
Likely AvailableWIRED @WIRED
By compromising a single supplier, spies or saboteurs can turn any application, any software update, even their physical equipment into a Trojan horse. https://t.co/t5wovTY4dE — PolitiTweet.org