Consumer Hardware
This technique has been observed in real-world attacks on AI systems.
Adversaries may acquire consumer hardware to conduct their attacks. Owning the hardware provides the adversary with complete control of the environment. These devices can be hard to trace.