rene_mobile’s avatarrene_mobile’s Twitter Archive—№ 8,054

  1. …in reply to @Nexuist
    @Nexuist @matthew_d_green I understand that part, but another aspect of the threat model is physical distance of access. For NFC, realistically it implies holding the device in hand. For Bluetooth, attacks at (local) scale are realistic.