• Septimaeus@infosec.pub
    link
    fedilink
    arrow-up
    18
    ·
    2 days ago

    They can’t unless your entire system is compromised.

    That research paper was a POC using kernel access and the models used were calibrated to specific subjects in a particular setting. Replicating it for anyone anywhere would require much, much more sophisticated models and that the target has given you root.