Authored by LiquidWorm | Site zeroscience.mk

This paper goes over common components of broadcast systems, how hackers take advantage of them, and discusses some of the vulnerabilities discovered.