Hacker can disguise slave and connect to master for malicious objective. In master, filtering of connection as slave is needed.
Hacker can disguise slave and connect to master for malicious objective.
In master, filtering of connection as slave is needed.