| http://www.w3.org/ns/prov#value | - All that would be required to steal a car, the researchers said, is a moment next to the car owner to extract data from the key, less than an hour of computing, and a few minutes to break in, feed the key code to the car and hot-wire it.The implications of the Hopkins finding go beyond stealing cars.
|