JackTheMimic's avatar
JackTheMimic 2 months ago
Right... Again I am not talking about activation or deployment... The point is FOR the malware to be found. THAT is the attack. The reflexive response. I don't care about embedded data, steganographic or otherwise. You literally CAN'T put contiguous bytes together to trip Malware detectors now because of the PUSHDATA limit (unless Side-channeled obvsly).

Replies (3)