Whole devices can be taken over by hackers exploiting a fragmented, community-driven subtitle ecosystem, in what researchers call “the most severe category of vulnerability”.

Leave a Reply