Hacker Newsnew | comments | show | ask | jobs | submit login

Quite a bit - not total kernel access, given the GPL symbol table export restrictions, but at least as much as a process running as root in user space.

That said, it's quite likely that such malicious behavior would be detected by somebody.




Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: