- cross-posted to:
- technology@lemmy.world
- cross-posted to:
- technology@lemmy.world
The backdoor, known for years by vendors that sold the technology but not necessarily by customers, exists in an encryption algorithm baked into radios sold for commercial use in critical infrastructure.
You must log in or register to comment.
Good read. I didn’t really know how radio encryption worked before, and now it makes more sense.