Hacker News new | past | comments | ask | show | jobs | submit login

There is an analysis here:

Highly-Secure Backdoors: Internet of Traitorous Things (IoTT)

        https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3425957



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: