Skip to content

Lesson 4, Concept: Input Privacy #184

Jan 10, 2021 · 3 comments · 4 replies
Discussion options

You must be logged in to vote

I would say this boils down to whether the tool itself is intentionally designed as malware or is hijacked by malware, in which case the best defence / preventive mechanisms are that of general cybersecurity best practises. You can also run diagnostics against your computer / this piece of software to understand if it is malicious in any way shape or form.

Replies: 3 comments 4 replies

Comment options

You must be logged in to vote
1 reply
@adtygan
Comment options

Answer selected by adtygan
Comment options

You must be logged in to vote
1 reply
@adtygan
Comment options

Comment options

You must be logged in to vote
2 replies
@leriomaggio
Comment options

@adtygan
Comment options

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
5 participants