

I saw it in a little queer movie theater and could barely prevent my body from making disruptive crying noises and afterward burst out onto the street bawling harder than I ever have. It’s profound, and I can’t even put my finger on exactly what makes it so











I assume the goal is to make it so the c2 server(s) are basically indistinguishable from any other node, perhaps by making much more inter-node traffic than is strictly necessary. Couple this with almost all the participating IP addresses belonging to innocent parties (since it’s malware) and I’m not sure how one would identify the true origin of commands