Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If it communicates electronically, you could extract encryption keys and hijack communications.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: