• brsrklf@jlai.lu
    link
    fedilink
    English
    arrow-up
    4
    ·
    1 day ago

    Nah, they evolved way past that in the following decades.

    Sometimes when they’re in a hurry they create GUI interfaces using Visual Basic to track IP adresses.

    And sometimes, if they’re very good, a hacker can manually carve a virus in a piece of bone using fractal patterns. They can use that to hack the computer scanning the bone so it adds a zero in thresholds for CPU heat monitoring and make it instantly catch fire.