Hacker News new | past | comments | ask | show | jobs | submit login

What is the actual attack vector? The leak document just lists a dll that could be replaced to do nefarious things. How are these dlls getting replaced?



Microsoft provided backdoor into windows ?




Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact

Search: