@cmuratori In particular, the part where the cell phone just magically hacks your computer without any mention of a particular exploit.
-
-
Replying to @nothings
@cmuratori Probably they've shown that the cell phone can *listen* to certain things on the computer, but not *hack the computer*.1 reply 0 retweets 0 likes -
Replying to @nothings
@nothings@cmuratori That was my assumption as well - that you still have to infect the target physically. But that would be old news, so...1 reply 0 retweets 0 likes -
Replying to @tom_forsyth
@tom_forsyth@nothings@cmuratori It says in the full article it builds a connection using FM freqs to install a virus on a remote computer.1 reply 0 retweets 0 likes -
Replying to @Lokno
@tom_forsyth@nothings@cmuratori "...it scans for electromagnetic waves which can be manipulated to build a network connection.."2 replies 0 retweets 0 likes -
Replying to @Lokno
@Lokno@tom_forsyth@cmuratori The problem is people get distracted by the how of the physical embodiment of the connection (FM waves);1 reply 0 retweets 0 likes -
Replying to @nothings
@Lokno@tom_forsyth@cmuratori I'm asking 'what element of the computer is 'listening' to FM waves that allows a remote execution attack'.1 reply 0 retweets 0 likes -
Replying to @nothings
@nothings@Lokno@tom_forsyth Well, there have been attacks in the past that try to read monitor output electromagnetically, haven't there?2 replies 0 retweets 0 likes -
Replying to @cmuratori
@cmuratori@Lokno@tom_forsyth Read, not write. That's what I was saying in my original reply. Read is plausible. Not write.1 reply 0 retweets 0 likes -
Replying to @nothings
@nothings@Lokno@tom_forsyth Does the actual thing claim _writing_? I just assumed they were talking about reading.1 reply 0 retweets 0 likes
@nothings @Lokno @tom_forsyth We need to get a copy of the actual article.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.