“One of the most unusual elements of this case was the attacker’s use of physical access to install a Raspberry […]