• Quibblekrust@thelemmy.club
      link
      fedilink
      English
      arrow-up
      1
      ·
      10 hours ago

      First, you break into the house, then you install an invisible backdoor, and then you can come and go freely.

      It’s a “post-exploit” tool. It’s the persistent backdoor you install after you break in. It survives reboots, unlike most exploits.