This video covers how an air gapped computer can be hacked.
Timestamps:
00:00 What An Air Gapped Computer Means
00:40 Use Cases
01:30 SCIF
02:35 Bad Hardware
07:37 TEMPEST
10:40 BadBIOS
11:46 Supply Chains
14:17 Thermal Attacks
15:24 Optical Attacks
18:20 Stuxnet
22:00 Apple
Privacy & Cybersecurity Consulting: https://kenharris.io/consulting
Twitter: https://x.com/KenHarrisio
Website: https://kenharris.io/