this post was submitted on 05 Jun 2025
14 points (88.9% liked)

Furry Technologists

1521 readers
1 users here now

Science, Technology, and pawbs

founded 2 years ago
MODERATORS
top 1 comments
sorted by: hot top controversial new old
[–] Delta_V@lemmy.world 1 points 1 month ago

This article seems to describe one of the things an attacker can do once they already have access to your device - a method for maintaining access that can evade detection. Did I miss the part where this article explains how a machine gets compromised in the first place, or does it just presume your machine is already somehow infected?