Theoretical Cyber Attack Assortment of Ridiculousness - StarMighty


Star Mighty.
S1REN
Star Mighty.
So imagine a scenario or attack where for the purposes of evidence of data exfiltration from a machine there was the ability to alter the information carrier medium.
How is something containing so much data possible to transfer in an efficient manner?
Well I then ask you if you have the capability for 17-octet encrypted multiplex Mass UDP payload delivery is a pre-existing capability?
Well, imagine this Jerry.
If you do have such an existing capability to pull and translate between bit-wise loopback Hz levels corresponding to the light translated by RGB and convert to said encryption levels at minimum to no CPU - well.
Jerry: Following - gotcha.
I call it Star Mighty Jerry.
Star Mighty.
Comments are closed.