Hacker News new | past | comments | ask | show | jobs | submit login

What was required to achieve this result ? That is, what did these folks have to break in order to gain control of the wifi chip in this way ?

How does this work compare to gaining (similar) access to the baseband processor on a phone ?

There should be a bounty for that ...




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: