check this pdf

https://arxiv.org/abs/2301.00269

Reply to this note

Please Login to reply.

Discussion

"These loopholes can be exploited by

malicious attackers to jeopardize our daily use of WiFi devices.

As examples, we demonstrate how an attacker can take advantage of these loopholes to extract private information such as breathing rate and quickly exhaust the battery of a typical IoT device, leaving the victim’s device in a disabled state."

nostr:note1x46ugvz8khkf5tfds0nsysatwg68nqsdf5nhyvd7qedt5f5kja6sgzx43t