Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Hacker used Phantom memory...
#2
steenh: Actually there is no known way of hacking Phantom. The device itself is secured with ssh key, which is probably heavy guarded and not obtainable from Devialet. What exactly has happened and why do you think it's related to Phantom?
Reply


Messages In This Thread
Hacker used Phantom memory... - by steenh - 03-Oct-2016, 10:49
RE: Hacker used Phantom memory... - by dmitrek - 03-Oct-2016, 10:52
RE: Hacker used Phantom memory... - by steenh - 03-Oct-2016, 11:38
RE: Hacker used Phantom memory... - by ragwo - 03-Oct-2016, 12:00
RE: Hacker used Phantom memory... - by steenh - 03-Oct-2016, 16:36
RE: Hacker used Phantom memory... - by ragwo - 03-Oct-2016, 16:47
RE: Hacker used Phantom memory... - by steenh - 03-Oct-2016, 16:52
RE: Hacker used Phantom memory... - by ragwo - 03-Oct-2016, 20:55
RE: Hacker used Phantom memory... - by steenh - 04-Oct-2016, 09:27
RE: Hacker used Phantom memory... - by dkoretz - 09-Oct-2016, 18:37

Forum Jump:


Users browsing this thread: 2 Guest(s)