Hacker News new | past | comments | ask | show | jobs | submit login

If you show how to break a system, don't you implicitly show the parts that are broken that need to be fixed? The entire protocol is so poor you should probably just not use the tech anymore.

The cryptography method uses a key of 4 bytes and is reused constantly, that's pretty much reason alone to dump keyboards using that encryption scheme.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: