• The_Decryptor
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 day ago

    The “attack” is from the host side, any remote attack is theoretical and would depend on exploiting the software on the host first to then gain access to the BT chip.