| ▲ | nine_k 14 hours ago | |||||||
But once you've located the device, you can use a number of electronic warfare approaches to crack into it, not necessarily through its main radio interface. For instance, electromagnetic interference, heating, etc, all can inject a subtle hardware failure that the software is not ready to handle. | ||||||||
| ▲ | Retr0id 14 hours ago | parent [-] | |||||||
Hence, "the real advantage is surely that nobody notices you're transmitting data at all?" | ||||||||
| ||||||||