"These loopholes can be exploited by
malicious attackers to jeopardize our daily use of WiFi devices.
As examples, we demonstrate how an attacker can take advantage of these loopholes to extract private information such as breathing rate and quickly exhaust the battery of a typical IoT device, leaving the victim’s device in a disabled state."
nostr:note1x46ugvz8khkf5tfds0nsysatwg68nqsdf5nhyvd7qedt5f5kja6sgzx43t