Hacker Timesnew | past | comments | ask | show | jobs | submitlogin

I don't get what these can be used for. Is the idea to swap it out with your victim's iPhone charging cable and use it to exfiltrate photos and stuff from the iPhone?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: