Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Easy. You do a relay attack.

I.e. instead of comp -> wireless -> device, you go comp -> extender <comp> -> extender <device> -> device -> extender <device> -> extender <comp> -> comp.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: