Well, that’s theoretically possible, but it’s actually used for bypassing hardware authenticity checks in Cisco hardware being cloned — a sizable industry. Of course, “can’t believe it ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results