• catfish@lemmy.ml
    link
    fedilink
    arrow-up
    16
    ·
    6 months ago

    Perhaps worth pointing out that the attacks require the attacker to position a piece of hardware between the Qi charger and the power source.