Hacker News new | past | comments | ask | show | jobs | submit login

Other devices mitigate this attack vector by at least requiring physical access to the device or it's packaging (they require authorization with the serial number or some other secret on the device, or pressing a button on the device)



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: