"These loopholes can be exploited by

malicious attackers to jeopardize our daily use of WiFi devices.

As examples, we demonstrate how an attacker can take advantage of these loopholes to extract private information such as breathing rate and quickly exhaust the battery of a typical IoT device, leaving the victim’s device in a disabled state."

nostr:note1x46ugvz8khkf5tfds0nsysatwg68nqsdf5nhyvd7qedt5f5kja6sgzx43t

Reply to this note

Please Login to reply.

Discussion

No replies yet.