Comment Effictive and Anonymous (Score 1) 1
When you think about it, the touch is a near perfect platform for stealthy attacks. As the article states, put the thing in a fake wall plate on a power switch and attack until the device is found. No phone account, so the device is close to untraceable. Just don't give it your name :)