Hacker News new | past | comments | ask | show | jobs | submit login

Wouldn't the attacker need to be authenticated as the user of the real device for this to work?



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: