How? By compromising the baseband, and then pivoting to compromise the AP? But what about IOMMU? Or is that pwnable?
How? By compromising the baseband, and then pivoting to compromise the AP? But what about IOMMU? Or is that pwnable?