This article is within the scope of WikiProject Computer security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.Computer securityWikipedia:WikiProject Computer securityTemplate:WikiProject Computer securityComputer security
This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.ComputingWikipedia:WikiProject ComputingTemplate:WikiProject ComputingComputing
This article has been automatically rated by a bot or other tool as Stub-class because it uses a stub template. Please ensure the assessment is correct before removing the |auto= parameter.
Milk Maid style of attacks?
There seems to be no such thing as `Milk Maid' attack, the Google search does not return any relevant results. I have, however, found documents[1][2] about `Evil Maid' attacks instead and this seem to be the correct term to be used here. I have changed the article accordingly. — Preceding unsigned comment added by JITR (talk • contribs) 14:05, 3 August 2016 (UTC)[reply]