I'd be curious to know more about the methods used.
Did they somehow spread an infection through the bittorrent protocol, or was there an alternate route used?
How exactly did the malware arrive on consumer devices?
For news, discussions and memes!
This community follows the Lemmy.zip Instance rules, with the inclusion of the following rule:
You can see Lemmy.zip's rules by going to our Code of Conduct.
What to Expect in Our Code of Conduct:
If you enjoy reading legal stuff, you can check it all out at legal.lemmy.zip.
I'd be curious to know more about the methods used.
Did they somehow spread an infection through the bittorrent protocol, or was there an alternate route used?
How exactly did the malware arrive on consumer devices?