Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

They may not have known about these protocol flaws at the time they were intercepting the physical devices.

Either that, or they were not vulnerable to these exploits at the time.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: