All OS have local privilege escalation holes. However, this is not a reasonable foundation, because no practical OS succeeded at enforcing such an isolation. Theoretically, if you run the code as a non-privileged user, and your operating system ensures perfect isolation against non-privileged local users, then you might recover from running malicious code without reformatting your complete hard drive. If that code is hostile, then you have lost: as soon as you run malicious code on your own machine, that malicious code can more or less hijack your whole machine. The application which you "install" to use the VPN service is local code.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |