Jump in the discussion.

No email address required.

Of course, privileged access is required, but that's not a problem in many cases.

:#marseynothingburger:

The only real way to ensure your device's security is to ensure it's physical security first and foremost. Once someone has access to the hardware in person, it's over.

Jump in the discussion.

No email address required.

Ehhh, I could totally see this being used with malware and signing a malicious kernel extension.

Jump in the discussion.

No email address required.

Link copied to clipboard
Action successful!
Error, please refresh the page and try again.