Image: Sascha Kohlmann , CC BY-SA ???r3r3446.
There are systems that are not available to ordinary mortals by default. And the developers of such systems naively believe that they are protected from penetration and sharp eyes of researchers.
Take at least ATMs (ATM). It is not unusual for an unknown person to approach ATM, connect a laptop, take money and leave without leaving any logs in the system. And recent stories from "
cutlets "(Malware called
? Cutlet Maker [/i] ) And even more so that there are no invulnerable systems - there are some under-researched ones...