Comment by goodmythical 13 hours ago It's already got access to CPU and RAM...how else do you think it works? 0 comments goodmythical Reply No comments yet Contribute on Hacker News ↗
No comments yet
Contribute on Hacker News ↗