Comment by upofadown
7 hours ago
In a very real sense you do need access to the device to install the backdoored client.
There is no actual cryptographic weakness presented here...
7 hours ago
In a very real sense you do need access to the device to install the backdoored client.
There is no actual cryptographic weakness presented here...
No comments yet
Contribute on Hacker News ↗