The hacking of Starlink terminals has begun
“Generally, there are two obvious things you could try to attack: signature verification or hash verification,” Wouters says. The problem goes against the signature verification process. “Normally you want to avoid shorts,” he says. “In this case, we do it on purpose.” Initially, Wouters attempted to bug the chip at the end of its boot … Read more