Also, even if you use your own homemade ultra secure OS, you will still be running it on top of the closed source & exploitable broadband chip.
Also, even if you use your own homemade ultra secure OS, you will still be running it on top of the closed source & exploitable broadband chip.