• mozz@mbin.grits.dev
    link
    fedilink
    arrow-up
    6
    arrow-down
    2
    ·
    edit-2
    9 months ago

    Yeah. It was pretty interesting to hear the details of pretending to be a HID device and how you could use it in practice to make malicious changes to the host computer. But surely adding to /etc/hosts is not the most preferred sneaky thing you can do with your unrestricted access.