Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

So now it's "someone who has unfettered physical access to the machine can take advantage of that"?

I'm just not impressed in general by hacks which begin with "first you must achieve a complete breach of the target machine's security..."



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: