Very true. That type of connection (sending/tunneling traffic) is basically how a configured VPN works. But I see your perspective, using your computer as a node where your computer downloads everything first and sends it off elsewhere
I mean what difference would it make if the browser itself was hidden in the virus itself? ie HttpClient… make a bunch of connections, do some downloading here and there… suddenly you have someone going “That’s not mine, how did it get there?!”
Very true. That type of connection (sending/tunneling traffic) is basically how a configured VPN works. But I see your perspective, using your computer as a node where your computer downloads everything first and sends it off elsewhere
I mean what difference would it make if the browser itself was hidden in the virus itself? ie HttpClient… make a bunch of connections, do some downloading here and there… suddenly you have someone going “That’s not mine, how did it get there?!”
sounds like some Chromium in action u/#Fire