• @bitfucker
    link
    31 month ago

    Correct me if I am wrong, isn’t a simple firewall that blocks incoming and outgoing connection is basically impenetrable? Because when something tries to connect, then the connection is dropped immediately unless on a certain port. If even the connection attempt were ignored, how would an exploit achieve some form of connection? Unless we are talking about application level firewall or deep packet inspection