It sounds like these are actually pretty widespread at this point. It’s not just them, 10 years after their product was released. The challenge especially in military applications would be correctly identifying the target.
security experts Runa Sandvik and Michael Auger demonstrated that naive software design left the rifle’s aiming computer open to remote hacking when its Wi-Fi capability was turned on
Not even “smart” weapon designers are taking embedded device security seriously enough. I wish I were surprised.
I think that’s how the TrackingPoint system works as well.
For the unfamiliar.
It sounds like these are actually pretty widespread at this point. It’s not just them, 10 years after their product was released. The challenge especially in military applications would be correctly identifying the target.
Not even “smart” weapon designers are taking embedded device security seriously enough. I wish I were surprised.