In this chapter we introduce some wirless protocols, which are relevant in hardware hacking.
Last updated 1 month ago