I found this article quite amusing:

https://sysdig.com/blog/fishing-for-hackers

He basically does the *opposite* of recommended security practice and sees what happens.

Reply to this note

Please Login to reply.

Discussion

That's pretty much exactly what happened to me, but with a different attack designed to turn my machine into some kind of miner.

Oh like your computer is an Iranian nuclear centrifuge?

No, that involved a physical infiltration and extensive reverse engineering.