Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This is not apparent from the article. Where could I find out about this ability?


If such an ability doesn't exist than how does this potential threat follow?

(article) > But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices.

I am also missing a key part of the technical details involved in this this situation.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: