Caution Tools like charger, keyboard can also hack the laptop
peripherals device hack system A few years ago, a retired officer of the Income Tax Department, during an interview, had some 'naivety' words on cloud computing and mobile security, like cloud computing succeeded only when there are good clouds in the sky. He also commented that in the US, when someone's mobile phone gets spoiled, some people get ready to buy it by paying a fair price. Even if you remove SIM, SD card etc. from your mobile phone, even reset it several times, even then these people are ready to pay a lot for it. The gentleman had argued that the mobile phone's data actually goes to the battery and misuses it by removing the data from the battery that it purchases. This statement was fun and incredible too. The understanding of retired officer's IT was really very limited, it was clear. But what he said in the form of a battery, he has now turned into an arrow. Some studies in Western countries have alerted that the other devices (peripherals) you conn...