Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Seems like you still need a device either exploited or created physically located near your target/s. Maybe a car worm virus? Exploit one car and if it has a cell connection piggyback?

Feels a little like the 90s ILUVYOU emails :)



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: