Michael Niedermayer (12025-02-03): > Lets assume we have 2 projects in one the vulnerability was taken advantage of > while in the other it was not. > > How would you tell them apart ? One of them would have a software-defined radio subsystem, the other not. Regards, -- Nicolas George