Those some like consumer products where you use the devices. It doesn’t sound like something a hardcore programmer/information security would use except to test out the exploits they created on their programmer centric systems.
Yep, I agree. I thought the same. I figure there were ancillary tasks and maybe ways to use these devices that I wasn’t thinking of… The top use case that I can think of for any of these devices is as a secondary research device during investigations, pen test, etc.