You don't even need to be exploiting the target device, you might just be leaking data over that connection.
https://news.ycombinator.com/item?id=44169115
Yeah, I think this is the reason this proposal is getting more traction again.