mirashii 2 days ago

You don't even need to be exploiting the target device, you might just be leaking data over that connection.

https://news.ycombinator.com/item?id=44169115

1
notpushkin 2 days ago

Yeah, I think this is the reason this proposal is getting more traction again.