Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I'm guessing it goes something like:

- The cable is inserted into the victims computer - The electronics inside the cable creates a WiFi network - The attacker uses a separate computer to connect to this WiFi network - Transmit the payloads to the victim - ??? - Profit



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: