Respuesta :

W0lf93
An example of this is an application that runs in the background of a mobile device or computer. Because the user does not know the application is running, in theory they would not know how to exploit the software.