logoalt Hacker News

daveguyyesterday at 9:12 PM1 replyview on HN

Because log processing is handled in the kernel/root/system? Is this a trick question?

See also: rsyslogd


Replies

dborehamtoday at 1:16 AM

I think the idea is the attacker didn't compromise both the local machine and the remote log sink machine. If you want to get really fancy the techniques used in cert revocation logs/blockchains could be used.