• @Evotech
      link
      English
      123 months ago

      Trigger bot

    • @CookieOfFortune
      link
      English
      83 months ago

      I think that’s how the TrackingPoint system works as well.

      • @[email protected]
        link
        fedilink
        English
        8
        edit-2
        3 months ago

        For the unfamiliar.

        It sounds like these are actually pretty widespread at this point. It’s not just them, 10 years after their product was released. The challenge especially in military applications would be correctly identifying the target.

        • @[email protected]
          link
          fedilink
          English
          63 months ago

          security experts Runa Sandvik and Michael Auger demonstrated that naive software design left the rifle’s aiming computer open to remote hacking when its Wi-Fi capability was turned on

          Not even “smart” weapon designers are taking embedded device security seriously enough. I wish I were surprised.