Hacker News new | past | comments | ask | show | jobs | submit login

No. If an EDR relies on userland mechanisms to monitor, these userland mechanisms can easily be removed by the malicious process too.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: