Reply to post: Re: Security

You wait ages for a mid-air collision spoofing attack and along come two at once: More boffins take a crack at hoodwinking TCAS

andy 103 Silver badge

Re: Security

It's more concerning how people who come up with these proofs of concept get the information required to simulate them in the first place.

From the way this article is written it suggests all they did was a bit of Googling, then bought a mid-to-high spec computer from their local PC World. Frightening that that's "all" it takes. The information needed to do something like this shouldn't be in the public domain, simple as.

It isn't security through obscurity because they clearly knew enough about how it worked to simulate an attack. Absolutely crazy.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

SUBSCRIBE TO OUR WEEKLY TECH NEWSLETTER

Biting the hand that feeds IT © 1998–2020