• @CookieOfFortune
    link
    English
    84 months ago

    I think that’s how the TrackingPoint system works as well.

    • @[email protected]
      link
      fedilink
      English
      8
      edit-2
      4 months ago

      For the unfamiliar.

      It sounds like these are actually pretty widespread at this point. It’s not just them, 10 years after their product was released. The challenge especially in military applications would be correctly identifying the target.

      • @[email protected]
        link
        fedilink
        English
        64 months ago

        security experts Runa Sandvik and Michael Auger demonstrated that naive software design left the rifle’s aiming computer open to remote hacking when its Wi-Fi capability was turned on

        Not even “smart” weapon designers are taking embedded device security seriously enough. I wish I were surprised.