• @[email protected]
      link
      fedilink
      1410 months ago

      Yes, that’s my understanding. A normal user cannot do this. (And of course, an attacker shouldn’t not control a local user in the first place.)

      Physical access is also a risk, but physical access trumps everything.