Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

They mean to attach a device to the victim car that does Car BT <-> Device <-> 5G <-> Hacker


Seems like you still need a device either exploited or created physically located near your target/s. Maybe a car worm virus? Exploit one car and if it has a cell connection piggyback?

Feels a little like the 90s ILUVYOU emails :)




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: