Emerging Long-Range WAN Networks Vulnerable to Hacking, Compromise By adminJanuary 29, 2020Security The root keys used to protect communication on LoRaWAN infrastructure can be easily obtained, IOActive says. ——– Free High Security Email from Sigma