this post was submitted on 05 Jun 2025
16 points (90.0% liked)

Furry Technologists

1594 readers
1 users here now

Science, Technology, and pawbs

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] Delta_V@lemmy.world 1 points 9 months ago

This article seems to describe one of the things an attacker can do once they already have access to your device - a method for maintaining access that can evade detection. Did I miss the part where this article explains how a machine gets compromised in the first place, or does it just presume your machine is already somehow infected?