top | item 39211177

(no title)

rolltrunhert | 2 years ago

The article explains how ars was used for a second stage payload.

The device would have to be initially compromised by other means (by usb drive in their slides).

Browsing ars did not expose any users.

Did you read, or just writing comments anyway?

discuss

order

kurthr|2 years ago

Yeah, I read the article on Ars before it showed up here (it's a day old). It seemed more like it was to obscure CC server and payload location.

I was talking about outlinks anyway.