There’s no way to say this one way or the other until it’s implemented.
However to “verify” a system from a hardware level to any decent level of accuracy would require kernel level access.
Technically you’re correct, until you’re not.
That's still not what a rootkit is. Lol
There’s no way to say this one way or the other until it’s implemented.
However to “verify” a system from a hardware level to any decent level of accuracy would require kernel level access.
Technically you’re correct, until you’re not.
That's still not what a rootkit is. Lol