• @[email protected]
    link
    fedilink
    English
    38 months ago

    Those all are things that require external human intervention though?

    If the malware is persistent, then one way or another it needs to leave an exploit on the device, it can either be a persistance exploit, or a privesc exploit.