• Delta_V@lemmy.worldBanned
    link
    fedilink
    arrow-up
    2
    ·
    9 months ago

    This article seems to describe one of the things an attacker can do once they already have access to your device - a method for maintaining access that can evade detection. Did I miss the part where this article explains how a machine gets compromised in the first place, or does it just presume your machine is already somehow infected?