Hacker Timesnew | past | comments | ask | show | jobs | submitlogin

Quite a bit - not total kernel access, given the GPL symbol table export restrictions, but at least as much as a process running as root in user space.

That said, it's quite likely that such malicious behavior would be detected by somebody.



Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: