- Jul 3, 2015
- 8,150
What is local privilege escalation, with emphasis on the word "local"? Does it mean the attacker needs physical access to your system in order to do an exploit of this kind?
Is encrypting the disk effective against this exploit?
Is encrypting the disk effective against this exploit?