That doesn’t stop the attacker from using their own program. They can copy/paste the dmesg
source code.
1 Like
That doesn’t stop the attacker from using their own program. They can copy/paste the dmesg
source code.