Comment by throwaway290
15 hours ago
> they could exfiltrate your data through the same connection that they're using for their legitimate purpose.
their traffic can be monitored. They can secretly exfiltrate if they hide it, use pin certs or use some custom encryption. This should be a red flag
No comments yet
Contribute on Hacker News ↗