(no title)
jbroman | 7 years ago
This may be a more convenient way to do so, but ultimately it's an attack that's rather hard to defend against under the usual desktop user-based access control model.
jbroman | 7 years ago
This may be a more convenient way to do so, but ultimately it's an attack that's rather hard to defend against under the usual desktop user-based access control model.
3pt14159|7 years ago
[0] https://security.stackexchange.com/a/170485/117977
[1] Code that shows, say, a false user login screen or exploits a previously unknown OS vuln to escalate privileges.