• henfredemars@infosec.pub
      link
      fedilink
      arrow-up
      3
      ·
      14 days ago

      Adept comparison! They are both difficult to destroy, and caused by misfolded or misappropriated software without actually putting new files or executables on the system. They are part of the system itself, integrated tightly into the existing software in memory.