How many times you think a state government uses this vs the thousands of cameras, warrants, a well placed USB stick on the desk, and monitoring the war thunder forums?
Very often. Software supply chain attacks are the most common method of infiltration these days, and even in environments with compliance requirements people are very laissez-faire about what they install.
Very often. Software supply chain attacks are the most common method of infiltration these days, and even in environments with compliance requirements people are very laissez-faire about what they install.