People act like your own computer is perfectly private.
- People act like your own computer is perfectly private.
- But it's vulnerable to being copied or even hacked when someone has physical access to it.
- For example, when you go through customs, it can be taken and scanned.