Warning: Some posts on this platform may contain adult material intended for mature audiences only. Viewer discretion is advised. By clicking ‘Continue’, you confirm that you are 18 years or older and consent to viewing explicit content.
Some DRM systems abuse security designs. Regular applications aren’t meant to be running at kernel level (ring 0) and should be running sandboxed at a user level. There are kernel dev blog posts that talk about this. It’s basically like making an arm move by poking a brain with a stick. Anything that can then access that stick or the hole you created can make at brain do whatever they want.
Some DRM systems abuse security designs. Regular applications aren’t meant to be running at kernel level (ring 0) and should be running sandboxed at a user level. There are kernel dev blog posts that talk about this. It’s basically like making an arm move by poking a brain with a stick. Anything that can then access that stick or the hole you created can make at brain do whatever they want.