Or are there are popular configurations where people have something plugged in and then unwitting be open to an exfiltration attack?
Theoretically you could exfiltrate data with it, but if you have root access to the RPi already then I don’t see why you wouldn’t just use Wi-Fi.
Or are there are popular configurations where people have something plugged in and then unwitting be open to an exfiltration attack?