Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If such an ability doesn't exist than how does this potential threat follow?

(article) > But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices.

I am also missing a key part of the technical details involved in this this situation.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: