• CeeBee_Eh@lemmy.world
    link
    fedilink
    arrow-up
    2
    ·
    21 days ago

    A well created malicious exploit will look like an image (or any other file) to a user, but can execute arbitrary code.

    That’s why I thought maybe you were just making a joke.