Why Nostr? What is Njump?
2023-05-27 16:33:40
in reply to

Cipher Stories on Nostr: Ok. Good. So kernels are code. I understand. Are there examples of malicious software ...

Ok. Good.

So kernels are code. I understand.

Are there examples of malicious software (trojans, spyware, viruses etc) being baked into kernels in a dormant manner so they remain undetected for a length of time before activating in a device?

Can you give me some examples of kernels hosting other code than what they are built to do?
Author Public Key
npub103tex2x0jq52g4yd2yt6lf8cgj8m2yx2jq3l2a4hhjg0cklxeelq7w3uul