Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Ask HN: Couldn’t spyware be subverted by tunneling through a trusted MitM proxy?
1 point by SnowHill9902 on July 13, 2022 | hide | past | favorite | 1 comment


Thats what big companies do. They break up tls connections and scan the content, with medium results. once the cryptotrojan is in, it doesn't need an channel out. The first generation had an small code that identified your strain. The developer just needed to decrypt it with his privatekey after payment and give you the decryptionkey.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: