A downloaded hardware driver does not match the checksum from the manufacturer , yet it installs and seems to behave as it should. Months later, you learn that sensitive information from your device has been leaked online. Which term best describes this type of attack?
A. Refactoring
A. Refactoring