Remove undefined
article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

There’s a group of bleeding-edge hackers who are looking at secondary channels of attack -- such as using pulsing light to imitate voice commands or specific frequencies of sound to simulate specific motion-related vibrations. I felt like was an area ripe for undefined behavior. Vamosi: Okay. There’s a lot to unpack here.

article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

There’s a group of bleeding-edge hackers who are looking at secondary channels of attack -- such as using pulsing light to imitate voice commands or specific frequencies of sound to simulate specific motion-related vibrations. I felt like was an area ripe for undefined behavior. Vamosi: Okay. There’s a lot to unpack here.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

There’s a group of bleeding-edge hackers who are looking at secondary channels of attack -- such as using pulsing light to imitate voice commands or specific frequencies of sound to simulate specific motion-related vibrations. I felt like was an area ripe for undefined behavior. Vamosi: Okay. There’s a lot to unpack here.

article thumbnail

The Hacker Mind Podcast: Hacking OpenWRT

ForAllSecure

I don't get directly paid for that but it’s just a strong desire to find the bugs in some of those applications. Eventually, though, he drifted into applications, source code, and fuzzing. came along like the use of undefined. For example, I've been working on a fuzzer which does cryptography. So it depends.

article thumbnail

The Hacker Mind Podcast: Hacking OpenWRT

ForAllSecure

I don't get directly paid for that but it’s just a strong desire to find the bugs in some of those applications. Eventually, though, he drifted into applications, source code, and fuzzing. came along like the use of undefined. For example, I've been working on a fuzzer which does cryptography. So it depends.

article thumbnail

The Hacker Mind Podcast: Hacking OpenWRT

ForAllSecure

I don't get directly paid for that but it’s just a strong desire to find the bugs in some of those applications. Eventually, though, he drifted into applications, source code, and fuzzing. came along like the use of undefined. For example, I've been working on a fuzzer which does cryptography. So it depends.