TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Hackers hijack Linux devices using PRoot isolated filesystems

3 pointsby anomalyticsover 2 years ago

1 comment

theamkover 2 years ago
This title is pure clickbait.<p>Hackers _which already hijacked Linux devices_ via some other means, use PRoot to run the code. That &quot;makes these post-exploitation attacks platform and distribution-agnostic&quot;.<p>There is nothing in PRoot particularly useful for attacks -- making Linux software platform and distribution-agnostic is what basically every Linux developer out there wants, and there is a number of projects for this, including docker, appimage, flatpak and others.