Wow, first we get multitudes of reports regarding DSM-2 reliability, and now this.
IT firms and hackers often play a ongoing cat-and-mouse game. The firm develops a "secure" technology, a hacker finds a hole, and the firm fixes the problem. Granted, a fix to DSMX, if it does wind up being easy to hack, might require replacement receivers and/or transmitters, rather than inexpensive firmware upgrades.
My question is this: how easy is it to implement this exploit? Is it something that a kid could do in their basement after watching a YouTube video, or will it require more siphociated expertise? Based on what the article said, the components that are needed are fairly easy to come by, and not too expensive.
Another question is whether or not this exploit could be adapted to the other protocols, such as FASST, ACCST, etc.