Sunday, May 9, 2021

How a security researcher ‘hacked’ Apple AirTag

According to a German security researcher "Stack Smashing" tweeted about how he managed to “break into the microcontroller of the AirTag.” This enabled him to re-flash the microcontroller that enabled them to modify elements of the item tracker software. https://ift.tt/3tzsLFm

No comments:

Post a Comment

Moonshot says Kimi K2.5 builds on K2 with "pretraining over ~15T mixed visual and text tokens" and "can self-direct an agent swarm with up to 100 sub-agents" (Kimi)

Kimi : Moonshot says Kimi K2.5 builds on K2 with “pretraining over ~15T mixed visual and text tokens” and “can self-direct an agent swarm ...