Attack Vector Clarification

This cluster consists of comments repeatedly asking for details, explanations, practicality, and real-world examples of a specific security attack or attack vector referenced in the main post.

➡️ Stable 0.5x Security
3,949
Comments
20
Years Active
5
Top Authors
#8207
Topic ID

Activity Over Time

2007
1
2008
11
2009
42
2010
64
2011
109
2012
107
2013
167
2014
183
2015
212
2016
278
2017
212
2018
282
2019
274
2020
314
2021
342
2022
284
2023
356
2024
376
2025
306
2026
29

Keywords

HN PMK DefuseSec youtube.com arxiv.org USD CAN attack attacks attack vector vector attacker attackers router mitigate compromised malicious

Sample Comments

dr_kiszonka Apr 11, 2024 View on HN

That's an interesting attack vector, isn't it?

cookingrobot Apr 6, 2015 View on HN

Wouldn't that attack be possible even without this problem?

isaacimagine Apr 17, 2022 View on HN

Have any similar 'attacks' been pulled off in practice?

barmstrong Jun 17, 2010 View on HN

What hypothetical attack would this prevent?

sbierwagen Oct 5, 2019 View on HN

What attacks do you believe it enables?

rosndo Mar 10, 2022 View on HN

What real attacks would that enable?

woah Feb 14, 2018 View on HN

Have these trivial attacks happened?

lolc Mar 9, 2018 View on HN

What is the attack? And what is malicious about it?

nr2x Feb 5, 2022 View on HN

What attack? I'm genuinely curious.

Sir_Cmpwn Jan 3, 2017 View on HN

The described attack doesn't sound convoluted at all, it seems very practical.