Martin Sundhaug

Results 26 comments of Martin Sundhaug

No specific one, however: ~~1. If the victim is browsing a router web-UI exposing the password, an attacker who can decrypt packets can also see the password 2. If the...

@kristate It could work. Updated the previous comment since the victim is disconnected from the true AP and thus would not be able to be used as a proxy to...

Yeah, this is kinda bad. One alternative would be to have the authentication-tokens not be visible for users that aren't logged in, but I think requiring auth is the best...

@mfrederickson What's the point of authentification tokens that can be gained without any authentification?

Seems to be because `bytes` is being returned rather than `str`, so relates to py3 compat

This would be really useful in Windows, where you'll often have UTF-16/UCS-2 strings

Looks like the peripheral-side could be implemented by checking `kbd.led_on(x)`, possibly sending two bits and a clock at once

Issue introduced in bd6fce37346064cb6c5cb78cb9b2982ad400467c

> Just received my Raspberry Pi 5 (8GB), almost ready to install the VMware ESXi Fling. All I need now is the rpi5 uefi bit... AFAIK VMware ESXi Flink does...