An actively exploited security issue in keyfobs that work by proximity: malicious users can replay signals from the house to the car! https://geekologie.com/2019/08/gone-in-thirty-seconds-doorbell-cam-foot.php
Newer cars use rolling keycodes so you can't replay the same code after locking, but this seems harder to defend against.
Related Posts
Do users of immutable systems (i.e Nix or Guix) upgrade more or less often than other platforms?
There's less pressure to upgrade (unlike a rolling release distro) but in principle upgrading is easier.
It's really satisfying to use a profiler for the first time on a project. I always find a big performance win with only a small code change.
It's never the code that I expected to be slow, however!
Over a sufficiently long time horizon, all code you write is legacy code.