How does this work compare to gaining (similar) access to the baseband processor on a phone ?
There should be a bounty for that ...
How does this work compare to gaining (similar) access to the baseband processor on a phone ?
There should be a bounty for that ...