• CameronDev@programming.dev
    link
    fedilink
    English
    arrow-up
    3
    ·
    6 months ago

    Those all are things that require external human intervention though?

    If the malware is persistent, then one way or another it needs to leave an exploit on the device, it can either be a persistance exploit, or a privesc exploit.