• The_Decryptor@aussie.zone
      link
      fedilink
      English
      arrow-up
      2
      ·
      20 hours ago

      The “attack” is from the host side, any remote attack is theoretical and would depend on exploiting the software on the host first to then gain access to the BT chip.