logoalt Hacker News

Elucalidavahlast Saturday at 5:28 AM0 repliesview on HN

If you have a privilege to replace the kernel or bootloader, you effectively have all privileges on that system. Therefore, there's no need to complicate the access limitations when you get full access anyway.