No Privacy: Cloning The AirTag


You’ve probably heard of the infamous rule 34, but we’d like to propose a new rule — call it rule 35: Anything that can be used for nefarious purposes will be, even if you…
Read more at Hackaday…

Discover more from Emsi's feed

Subscribe now to keep reading and get access to the full archive.

Continue reading