Cipher Stories on Nostr: Ok. Good. So kernels are code. I understand. Are there examples of malicious software ...
Ok. Good.
So kernels are code. I understand.
Are there examples of malicious software (trojans, spyware, viruses etc) being baked into kernels in a dormant manner so they remain undetected for a length of time before activating in a device?
Can you give me some examples of kernels hosting other code than what they are built to do?
Published at
2023-05-27 16:33:40Event JSON
{
"id": "496f6737bf6c45c18e6bcb729afd8200d542c523bdac059f70dfa2d3ab8c6b74",
"pubkey": "7c579328cf9028a4548d5117afa4f8448fb510ca9023f576b7bc90fc5be6ce7e",
"created_at": 1685205220,
"kind": 1,
"tags": [
[
"e",
"b00cd40dba11fbc403c760f4f68bf3e839d2db2e47b63b2eb76fb8e4102c011d"
],
[
"e",
"2d0b99822854b790e7bca3b444be82d3c5cf115d7323e8cb9e8fd2f40c17b911"
],
[
"e",
"45d7ab68749f1158d130853ba6890ef0b63065a69c9312984dbc685ba991145c"
],
[
"p",
"7c579328cf9028a4548d5117afa4f8448fb510ca9023f576b7bc90fc5be6ce7e"
],
[
"p",
"5c10ed0678805156d39ef1ef6d46110fe1e7e590ae04986ccf48ba1299cb53e2"
]
],
"content": "Ok. Good.\n\nSo kernels are code. I understand. \n\nAre there examples of malicious software (trojans, spyware, viruses etc) being baked into kernels in a dormant manner so they remain undetected for a length of time before activating in a device?\n\nCan you give me some examples of kernels hosting other code than what they are built to do?",
"sig": "625cb062142efe50ede50bfaa2cd1afb2b2b7536ed530b62d2b5e58ebac32e0e11bed63add5e01a7f36f31b3833c9365fe76c7d29186652b45c18c0f6f4f8487"
}