The safest option is obvious, don’t try to access its contents, but if you absolutely had to, what steps would you take to minimize/contain any potential harm to your device/network?
The safest option is obvious, don’t try to access its contents, but if you absolutely had to, what steps would you take to minimize/contain any potential harm to your device/network?
We pxe boot into a custom live diskless distro that reboots after use. The network these live in is hardened.
Don’t enable usb on public computers you are not prepared to protect