I mean, if you're at the point where your machine is compromised by a process with full network access little snitch won't help much either.
I mean, if you're at the point where your machine is compromised by a process with full network access little snitch won't help much either.
You might be surprised, there are plenty of low effort attacks out there that just install a crypto miner and phone home periodically without doing much to cover it up.