• SendMePhotos@lemmy.world
    link
    fedilink
    English
    arrow-up
    6
    ·
    6 months ago

    From what I’ve learned, it is possible to create a vulnerability within the system of a ddos attack would overload and cause a reset or fault. At that point, it’s possible to inject code and initiate a breach or takeover.

    I can’t find the documentation on it so… Take it with a grain of salt. I thought I learned about it in college. Unsure.