Originally Posted by
ira d
As far as sending a a high level signal that overshadowes the legitimate signal otherwise know as jamming yes all protocols can be jammed. But as for hacking a proper designed system that should be extremely difficult
and only by using equipment not readily available to the average person.
It can all be jammed, replicated, copied, etc etc. Like all the other emerging "what if" doom and gloom stuff I continue to ask for examples and some statistical probability studies of it happening. We'll never see them, for obvious reasons.