1 min readDec 19, 2019
Nice research and shoving a potential vulnerability.
However it seems the attack requires significant investment in hardware in order to execute.
Nice research and shoving a potential vulnerability.
However it seems the attack requires significant investment in hardware in order to execute.
Creating the decentralized web — https://decentralizeweb.org, building a decentralized communication platform