You completely missed the point.

This isn't a comparison between whish OS is hypothetically more secure, it's a concrete example of a 15 year campaign that lists specific tactics and techniques, allowing people to better understand actual capabilities of this attacker.

FWIW, the article mentions a Mac being compromised by this same payload, along with a small number OpenBSD & FreeBSD.

Reply to this note

Please Login to reply.

Discussion

No replies yet.