Replying to MarsIronPI

I found this article quite amusing:

https://sysdig.com/blog/fishing-for-hackers

He basically does the *opposite* of recommended security practice and sees what happens.

That's pretty much exactly what happened to me, but with a different attack designed to turn my machine into some kind of miner.

Reply to this note

Please Login to reply.

Discussion

Oh like your computer is an Iranian nuclear centrifuge?

No, that involved a physical infiltration and extensive reverse engineering.