Guys i am new to arm implementations of linux but i am familiar with android on tablets. Can you guys suggest me procedures to keep in mind while trying to bypass
security of a linux on tablets. Like what all can be the attack vectors and what are the measures to be taken to prevent getting it from owned. and the last question.
is the security implementations and layout similar on tab as well as it is on linux on a pc?