The safest option is obvious, don’t try to access its contents, but if you absolutely had to, what steps would you take to minimize/contain any potential harm to your device/network?

  • kaboom36
    link
    fedilink
    English
    arrow-up
    1
    ·
    3 months ago

    I’d get a computer from my local ewaste center, strip any wireless functionality from it, load it with Linux, and use that