Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

There's a fantastic example of this from fall of 2019. China was using an iPhone 0day which was extremely complicated to do internal surveillance, and the C2 for it was happening over http.


What is a C2?



Command and control


command and control i think




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: