this post was submitted on 05 Jun 2025
15 points (89.5% liked)

Furry Technologists

1506 readers
1 users here now

Science, Technology, and pawbs

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] Delta_V@lemmy.world 2 points 1 month ago

This article seems to describe one of the things an attacker can do once they already have access to your device - a method for maintaining access that can evade detection. Did I miss the part where this article explains how a machine gets compromised in the first place, or does it just presume your machine is already somehow infected?