1.
Turn off unnecessary network and logical interfaces.
2.
Prohibit network interfaces from leaking security-related information.
3. Disable network/ADB
debug interfaces.
1.
Turn off unnecessary network and logical interfaces.
2.
Prohibit network interfaces from leaking security-related information.
3. Disable network/ADB
debug interfaces.