HN2new | past | comments | ask | show | jobs | submitlogin

Not really. Despite the name and theme, Microcorruption was about the kinds of vulnerabilities that exist in desktop and server systems; actual embedded exploration is very different. Typically there's a site key sent from the lock to the key, which authenticates itself with a second site key - often all in plaintext, on the more insecure systems. So you just sniff the communications.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: