The safest option is obvious, don’t try to access its contents, but if you absolutely had to, what steps would you take to minimize/contain any potential harm to your device/network?
You must log in or # to comment.
I’d get a computer from my local ewaste center, strip any wireless functionality from it, load it with Linux, and use that