Whereโ€™s the source to find out more about it?

Reply to this note

Please Login to reply.

Discussion

Or am I just misunderstanding, and this is not an exploit that has actually happened but a theoretical one?

Seems theoretical. But if there are casual musings in notes, then this avenue has likely been explored and exploited if possible