• @Natanael@slrpnk.net
    link
    fedilink
    English
    12 months ago

    These types of attacks would likely be implemented via DHCP spoofing / poisoning, unless you’re on a malicious network