Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This might work once, for somebody. Then law enforcement would understand what it is for, what it does, and cut the lanyard/string instead of removing the usb stick before apprehending the device.


Which is probably why the author mentioned wearables with Bluetooth.

Less conspicuous, and no strings to cut.


and way easier to workaround, nothing to cut simply duplicate the wireless signal.


How would you duplicate a wireless signal that contains an “answer” to a changing challenge (e.g. sign this message with the secret key)?


Easy. You do a relay attack.

I.e. instead of comp -> wireless -> device, you go comp -> extender <comp> -> extender <device> -> device -> extender <device> -> extender <comp> -> comp.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: