Think about what you just suggested.
Beaming isn't something magic, it's a medium for programs to send bits
to other programs with some format for what to do with them.
If your would-be victim's Palm is asleep, it's not listening for IR.
Well, some of your other answers are good enough that I
If there's any kind of leakage bias, then a high-powered signal might get a
few bits through. After that, only a Palm OS expert will know if there's
some kind of signal that can tease the Palm awake and then get it to swallow
some kind of trojan.
Bits are not marbles to exist outside
At 07:50 AM 6/3/2004, Tyler Durden wrote:
Anybody know of apps that allow someone to hack somebody else's Palm?
PalmOS doesn't have useful memory protection,
so if you can get somebody to run a trojan application, they're potentially
toast.
If you can't, then you're limited to whatever the
I think the notion of someone using your IR beaming capacity against your will is at
least a possible threat (imagine what happens if I get a trojan onto your Palm that's
supposed to leak data--it could just listen on the IR port, and hand over your data
when I get it the right message.) Some