Hacker News new | past | comments | ask | show | jobs | submit login

How do hackers get access to these devices and learn about how they're deployed in order to be able to exploit them? Can someone ELI5 this?



Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: