Why Nostr? What is Njump?
2025-03-18 20:34:42
in reply to

SteveW928 on Nostr: So, what is the realistic attack vector here? Someone has to get nefarious code onto ...

So, what is the realistic attack vector here? Someone has to get nefarious code onto the device that exposes the flaws?

Or, are you saying they can enable BT, get within BT range, then install code (or exploit something native to the chip)? And, then somehow transmit the seed phrase? Or change addresses, or stuff like that?
Author Public Key
npub1j5er26s255jh3e6z2a9twg5sz7dez83xuyq26pp6k8v7qq7sxlhql32kek