"The attack exploits the vulnerability on both participating devices simultaneously."
Eli Biham

January 1, 1970