Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Just unplug the cord, or disable the WiFi, for a few seconds. As we are presumably discussing sensitive data, nothing is as certain as the end of the cord in your palm.



Although an attack vector is it saving all that info in a buffer, continuously trying to beam it up until it gets a success response from the server.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: