Martin Sundhaug
Martin Sundhaug
No specific one, however: ~~1. If the victim is browsing a router web-UI exposing the password, an attacker who can decrypt packets can also see the password 2. If the...
@kristate It could work. Updated the previous comment since the victim is disconnected from the true AP and thus would not be able to be used as a proxy to...
Yeah, this is kinda bad. One alternative would be to have the authentication-tokens not be visible for users that aren't logged in, but I think requiring auth is the best...
@mfrederickson What's the point of authentification tokens that can be gained without any authentification?
Seems to be because `bytes` is being returned rather than `str`, so relates to py3 compat
This would be really useful in Windows, where you'll often have UTF-16/UCS-2 strings
Looks like the peripheral-side could be implemented by checking `kbd.led_on(x)`, possibly sending two bits and a clock at once
Issue introduced in bd6fce37346064cb6c5cb78cb9b2982ad400467c
> Just received my Raspberry Pi 5 (8GB), almost ready to install the VMware ESXi Fling. All I need now is the rpi5 uefi bit... AFAIK VMware ESXi Flink does...