• henfredemars@infosec.pub
    link
    fedilink
    arrow-up
    3
    ·
    14 days ago

    Adept comparison! They are both difficult to destroy, and caused by misfolded or misappropriated software without actually putting new files or executables on the system. They are part of the system itself, integrated tightly into the existing software in memory.