Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The exploits in the article you linked to requires physical access and modification.

This is about bluetooth and CD sound hacks, hopefully those have been locked down on future models since it's been known a while. http://www.nytimes.com/2011/03/10/business/10hack.html




I think we might be violently agreeing here. :)

The article I linked to links to the article you linked to about halfway down.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: