- cross-posted to:
- [email protected]
- cross-posted to:
- [email protected]
The backdoor, known for years by vendors that sold the technology but not necessarily by customers, exists in an encryption algorithm baked into radios sold for commercial use in critical infrastructure.
You must log in or register to comment.