They can’t unless your entire system is compromised.
That research paper was a POC using kernel access and the models used were calibrated to specific subjects in a particular setting. Replicating it for anyone anywhere would require much, much more sophisticated models and that the target has given you root.
They can’t unless your entire system is compromised.
That research paper was a POC using kernel access and the models used were calibrated to specific subjects in a particular setting. Replicating it for anyone anywhere would require much, much more sophisticated models and that the target has given you root.