Notably, high-profile incidents, such as the attack on Linux-based IoT devices in the Mirai botnet outbreak, demonstrate how deeply malicious actors can penetrate systems, even reaching firmware ...
and other GNU/Linux distributions. It stands out from most laptops not only because of its ARM-based processor, but also its modular design: the processor module can be removed and replaced.