Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

He also mentions that he only uses said tool with "charging stations I find suspicious". Which is very curious, because I would assume an attacker who is willing to risk burning such an attack would make sure their charging station is looking the least suspicious and most ordinary.

I'm not sure if "find suspicious" is a good heuristic here. Although of course we don't know what he bases his suspicion on.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: