Face it, if an attacker already has physical access to a system — to the extent that he can run his own Linux OS on it and mess with the contents of its disks — then that computer is already, entirely owned. This is true for Linux, it’s true for OS X, it’s true for BSD, and it’s true for Windows. That’s just the way computers work.

It’s much much harder with Linux. First of all you have to work out how to lure the user out of their basement and away from their computer.

Kugrian (886993)