Mobile Tsk

you may have noticed that I'm not all there myself

Age 28
he/him/his
Seen 4 Days Ago
Posted 4 Weeks Ago
1,217 posts
17.3 Years
I understand the concepts of double (and triple) agents in the context of politicals and the tangible world, but can someone explain to me how double agents work in the world of computer technology? I tried looking it up, but the only piece of useful information I could find is that double agents have high user consent but severe negative consequences. Is this the only real definition for them or are they a more specific group of malware?