Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The primary objective would be exfiltration, executive control is only secondary. If you can exfiltrate keys or hashes then you might not even need to use DMA to gain access to a system.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: