Hacker News
new
past
comments
ask
show
jobs
points
by
delamon
2 hours ago
|
comments
by
quantummagic
1 hours ago
|
[-]
It's not always as easy as you imply. All the attack vectors you mentioned, require root on the host,
before
you can make the change or install the trojan.
reply