(no title)
drum55
|
28 days ago
It’s a false sense of security, more or less. If an application wants to talk to a C2 they don’t have to make a connection at all, just proxy a connection through something already allowed, or tunnel through DNS. Those juicy cryptocurrency keys? Pop Safari with them in the URL and they’re sent to the malicious actor instantly. If you’re owned Little Snitch does nothing at all for you except give you the impression that you’re not.
nickorlow|28 days ago
sciencejerk|27 days ago
worthless-trash|28 days ago
Source. I work for a company for longer than the internet has been alive.
drum55|28 days ago
dfc|28 days ago
g-b-r|27 days ago
unknown|28 days ago
[deleted]