@cmuratori In particular, the part where the cell phone just magically hacks your computer without any mention of a particular exploit.
@tom_forsyth @nothings @Lokno So, the actual article here, when it actually describes the hack, sounds like it's RO: http://www.timesofisrael.com/with-new-hack-cellphone-can-get-data-out-of-computers/ …
-
-
@cmuratori@tom_forsyth@nothings@Lokno OK, so it's Van Eck phreaking, using phone as receiver? Still scary, but seems plausible. -
@cmuratori@tom_forsyth@nothings@Lokno And maybe secondarily, malware on target system manipulates video to encode other info as sideband. - Show replies
New conversation -
-
-
@cmuratori@tom_forsyth@Lokno Nope, the body text still claims malware-on-phone can inject malware-on-computer. (Also subhead "control"). -
@nothings@tom_forsyth@Lokno Yes, I know, but I'm saying when they _actually_ list what happens, it sounds like it's just read-only. - Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.