21:03:58mdhughesAnd weirdly keeps using "the Scheme" throughout.
21:04:18mdhughes"The scheme emphasizes functional programming and recursive algorithms, making it a suitable choice for forging high-tech hacking programs. "
21:06:19mdhughesWhat I always think of: https://youtu.be/ylwMWpbv5Fk
6:33:01pjbmoon-child: not really. run-time antiviruses just look at the accesses (they trap some syscall, etc). They don't care how the program does it, just what it does. static antiviruses would have it just as easy analysing the source than the binary. The only thing is that perhaps they don't bother analysing the sources, notably of "scripting" languages that need to be executed to determine 100% of the semantic.
6:35:50wasamasamoon-child: I mean, any custom malware goes undetected at first
6:36:03wasamasamoon-child: needs a certain critical mass to get the attention of malware analysts