• @CookieOfFortune
      link
      English
      81 month ago

      I think that’s how the TrackingPoint system works as well.

      • @[email protected]
        link
        fedilink
        English
        8
        edit-2
        1 month ago

        For the unfamiliar.

        It sounds like these are actually pretty widespread at this point. It’s not just them, 10 years after their product was released. The challenge especially in military applications would be correctly identifying the target.

        • @[email protected]
          link
          fedilink
          English
          61 month ago

          security experts Runa Sandvik and Michael Auger demonstrated that naive software design left the rifle’s aiming computer open to remote hacking when its Wi-Fi capability was turned on

          Not even “smart” weapon designers are taking embedded device security seriously enough. I wish I were surprised.