
14 Jun
2013
14 Jun
'13
8:47 a.m.
On Thu, Jun 13, 2013 at 10:34:28AM -0600, Phil Fagan wrote:
Yeah, I can't imagine there is any real magic there...mystical protocol not seen over transport.
Compromised NICs can leak info through side channels (timing) but it's too low bandwidth. For end user devices with backdoors (remote vulnerabilities are like sloppy backdoors) you could get away with 'it's just part of a botnet', perhaps.