Join Nostr
2025-12-10 10:09:41 UTC
in reply to

VessOnSecurity on Nostr: - Attackers can enter your computer/phone via Bluetooth. - Attackers hide behind ...

- Attackers can enter your computer/phone via Bluetooth.

- Attackers hide behind 13-14 chained proxies.

- Attackers turn your computer into an FTP server for illicit goods.

- The purpose of a rootkit is to let the attacker execute everything as root.