eventually all systems (computing or otherwise), no matter how secure their design, can be manipulated.
In related news, here's a post showing how to steal RFID credit card information with $8 worth of equipment from eBay.
« Older The People of the Omo Valley, Ethiopia, use their ... | With the potential 'crisis' wi... Newer »
This thread has been archived and is closed to new comments
Buy a Shirt