Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Such is the reason that the VM per app was born :-)

Though since this was written in Unity, it would be pretty easy to detect if it were using any of the networking libraries.



A hypothetical trojan horse doesn't have to use the network itself. It could just hide some essential data and/or plant a vulnerability for a later attack.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: