logoalt Hacker News

walterbellyesterday at 4:28 PM5 repliesview on HN

Presence of one or more: unexpected outbound traffic observed via Ethernet, increased battery consumption, interactive response glitching, display anomalies ... and their absence after hard reset key sequence to evict non-persistent malware. Then log review.


Replies

amazingmanyesterday at 5:22 PM

What are examples of logs that you're considering IOCs? The picture you are painting is basically that most everyone is already compromised most of the time, which is ... hard to swallow.

show 1 reply
acdhayesterday at 4:38 PM

How did you link that traffic to malicious activity?

show 1 reply
nickburnsyesterday at 4:36 PM

To where?

show 1 reply
meindnochyesterday at 4:48 PM

LOL. Aren't you a little paranoid?

show 1 reply
avazhiyesterday at 5:04 PM

[flagged]