Celejar writes:
> why would they be limited by whatever the OS supports? Surely their
> malware can easily include an internal DoH implementation,

They needn't use DNS at all.  Hard coded IPs work fine for reaching
their own servers.  They are also not limited to the usual ports and
protocols when talking to their own servers.
-- 
John Hasler 
[email protected]
Elmwood, WI USA

Reply via email to