Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> The problem is that the attacker isn't using a phone, they are using some type of specialized hardware.

Yeah I covered that in b) in my comment.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: