This has to be one of my favorite hacking articles I’ve read on HN. The analysis, concept, and execution :chefskiss: