we_are_2140 on Nostr: "These loopholes can be exploited by malicious attackers to jeopardize our daily use ...
"These loopholes can be exploited by
malicious attackers to jeopardize our daily use of WiFi devices.
As examples, we demonstrate how an attacker can take advantage of these loopholes to extract private information such as breathing rate and quickly exhaust the battery of a typical IoT device, leaving the victim’s device in a disabled state."
malicious attackers to jeopardize our daily use of WiFi devices.
As examples, we demonstrate how an attacker can take advantage of these loopholes to extract private information such as breathing rate and quickly exhaust the battery of a typical IoT device, leaving the victim’s device in a disabled state."
quoting note1x46…x43tcheck this pdf
https://arxiv.org/abs/2301.00269