Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You don't even need to be exploiting the target device, you might just be leaking data over that connection.

https://news.ycombinator.com/item?id=44169115



Yeah, I think this is the reason this proposal is getting more traction again.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: