• catfish@lemmy.ml
    link
    fedilink
    arrow-up
    1
    ·
    8 months ago

    Perhaps worth pointing out that the attacks require the attacker to position a piece of hardware between the Qi charger and the power source.