There exist USB devices that simulate mouse movement and keyboard activity. They are famously used by law enforcement on computers seized in a raid to prevent them from locking and requiring a password to unlock.
Create software that detects that such a device is being used and locks the screen, or more aggressively, wipes the device.
No comments :
Post a Comment