The Hacking of Starlink Terminals Has Begun
“From a high-level view, there are two obvious things you could try to attack: signature verification or hash verification,” says Wouters. The flaw works against the signature verification process. “Normally you want to avoid shorts,” he says. “In this case we do it on purpose.” Wouters initially tried to fail the chip at the end …