Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
throwawaysea
on Jan 17, 2021
|
parent
|
context
|
favorite
| on:
Running a fake power plant on the internet for a m...
How do hackers get access to these devices and learn about how they're deployed in order to be able to exploit them? Can someone ELI5 this?
Consider applying for YC's Spring batch! Applications are open till Feb 11.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: