Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Just like this post about making a software bypass to a security check, there are hardware guys making bypasses to security checks.

Now you create a situation where hardware bypassed cameras have immense value to bad actors.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: