Hacker News new | past | comments | ask | show | jobs | submit login

I don't see it. Give an example of how this attack can be executed, a practical application.

I approach my car, I press the button on the fob to open it, and your attack does what exactly?




Consider applying for YC's Summer 2025 batch! Applications are open till May 13

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: