logoalt Hacker News

nine_kyesterday at 11:07 PM1 replyview on HN

But once you've located the device, you can use a number of electronic warfare approaches to crack into it, not necessarily through its main radio interface. For instance, electromagnetic interference, heating, etc, all can inject a subtle hardware failure that the software is not ready to handle.


Replies

Retr0idyesterday at 11:10 PM

Hence, "the real advantage is surely that nobody notices you're transmitting data at all?"

show 1 reply