Given the interest in the industry I've decided to make some quick notes from
earlier this year available, I plan to expland on this later:
What can I do with SSH to the T2 anyway?
Initially, look around and perform additional research. Once executing on the
T2 core, the security