@Spudwart to [email protected]English • 2 years agoIt really is just another Rootkit.imagemessage-square34arrow-up1788arrow-down155
arrow-up1733arrow-down1imageIt really is just another Rootkit.@Spudwart to [email protected]English • 2 years agomessage-square34
minus-square@FlexibleToastlink2•2 years agoGreat, but using the TPM as intended is not a rootkit or anything like a rootkit. It’s using a security device as intended.
minus-square@MooseBoyslink-1•2 years agoAlthough often associated with it, a rootkit does not inherently need to be malware. In the case of phones, and likely future PCs, they are used to prevent users and owners from modifying their device.
Great, but using the TPM as intended is not a rootkit or anything like a rootkit. It’s using a security device as intended.
Although often associated with it, a rootkit does not inherently need to be malware. In the case of phones, and likely future PCs, they are used to prevent users and owners from modifying their device.