Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Wow that’s pretty neat.

Terrifying and neat; thanks for the explanation!

How easy is it for us (or rather the companies making the hardware) to detect and mitigate this?



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: