Hacker News new | past | comments | ask | show | jobs | submit login

How do hackers get access to these devices and learn about how they're deployed in order to be able to exploit them? Can someone ELI5 this?



Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: