Follow

"... a remote attacker within proximity can silently execute arbitrary code with the privileges of the Bluetooth daemon as long as Bluetooth is enabled. No user interaction is required ..."

insinuator.net/2020/02/critica

Sign in to participate in the conversation
Social feed

This is a personal and private instance.