@[email protected] to [email protected]English • 2 years agoIt really is just another Rootkit.lemmy.worldimagemessage-square32fedilinkarrow-up1764arrow-down155
arrow-up1709arrow-down1imageIt really is just another Rootkit.lemmy.world@[email protected] to [email protected]English • 2 years agomessage-square32fedilink
minus-square@[email protected]OPlinkfedilinkEnglish-4•2 years agoThere’s no way to say this one way or the other until it’s implemented. However to “verify” a system from a hardware level to any decent level of accuracy would require kernel level access. Technically you’re correct, until you’re not.
There’s no way to say this one way or the other until it’s implemented.
However to “verify” a system from a hardware level to any decent level of accuracy would require kernel level access.
Technically you’re correct, until you’re not.
That’s still not what a rootkit is. Lol