By this logic, all malicious JavaScript (obvious example is cryptominers I guess, assuming no JS sandbox escape) is C&C, yeah? As it "instructs site visitors" to do something harmful locally?
If you need to be on the site it’s not a botnet and there is no C&C server coordinating the attack. It‘s just the JS on the site that makes the attack.
Why? I did not visit the site to participate in a DoS attack; yet my machine was coaxed into participating against my will. Whether this is happening in JS or a drive-by download or a browser 0-day is irrelevant.
You should have a look through the lawbooks for more laws to not comply with. Do the carrying a duck across state lines one next. Maybe a Linux distro that pumps your own gas.
Right now, you can install F-Droid from an APK file without rooting the phone or installing a new boot loader. Google is threatening to take that capability away, via another mod. This seems to be part of a comprehensive program to keep the Google boot on the customer's face.
Also, currently, with difficulty, you can initialize a new unlocked Android phone without a Google account. Is that capability going away?
All these are related. This seems to be part of a comprehensive program to keep the Google boot on the customer's face.
reply