Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

She needs to print something using the fake printer. Nothing happens, IIUC, if Alice chooses to print a document with a real printer.


The attack can overwrite the real printer with a fake one.


Where did you see that?


Ctrl+F "replace"


in the middle of the alley




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: