Conversation
Edited 1 month ago
not entirely guaranteed that it didn't happen...
Show content
how the exploit was implemented "uwu can i exploit openssh through systemd dependency qwq"

how it should have been implemented:
- am i extracting a openssh tarball? then insert backdoor
- am i extracting a xz tarball? then perpetuate backdoor
- am i extracting a package manager? backdoor to prevent myself from uninstalling
0
0
0