Hardware what are the vulnerabilities in using a switch ? Are there any ? This is obviously a question of convenience. It would be nice to have less steps when connecting and using a DN machine.
I know absolutely nothing about hardware and VERY little about networking so I’m in the dark on this topic. My mind thinks, NO. Bc I have one connection coming into the switch then 2 connections leaving one to the DN machine and one to the CN machine.
My threat model is just some asshole coming after me bc they didn’t like a comment of mine or LE here thinking I run my mouth to much let’s see who this person really is. I don’t order goods. I’m only guilty of finding OpSec, Privacy, and Anonymity fascinating.