Skip to content
Better HN
Top
New
Best
Ask
Show
Jobs
Search
⌘K
undefined | Better HN
0 points
gnfargbl
1y ago
0 comments
Share
True, but the bad actor's code doesn't typically run directly on the infected device. Typically the infected router or camera is just acting as a proxy.
0 comments
default
newest
oldest
mike_hearn
1y ago
There are ways to detect that and it will still require a lot of CPU and ram behind the proxies.
j
/
k
navigate · click thread line to collapse