top | item 38993565

(no title)

thefurdrake | 2 years ago

Yeah, you'd need someone on the network to be doing something like browsing the internet and coming across a malicious website capable of making requests to other nodes on the local network, or downloading something that gives an attacker userspace access to scan the local network.

Those situations strike me as super rare, unlikely, and unrealistic, too.

discuss

order

No comments yet.