- Attackers can enter your computer/phone via Bluetooth.
- Attackers hide behind 13-14 chained proxies.
- Attackers turn your computer into an FTP server for illicit goods.
- The purpose of a rootkit is to let the attacker execute everything as root.