Hacker News new | past | comments | ask | show | jobs | submit login

So now it's "someone who has unfettered physical access to the machine can take advantage of that"?

I'm just not impressed in general by hacks which begin with "first you must achieve a complete breach of the target machine's security..."




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: