Comment by abeyer
2 months ago
Even if the TEMPEST were easier, it's significantly less powerful, as it's not going to get you the ability to write malicious firmware to the audio device nor a persistent connection to the host device when the audio device isn't connected.
No comments yet
Contribute on Hacker News ↗