All Questions
1 question
3
votes
1
answer
108
views
What security practices do I employ when building a library that requires low level root access to certain devices and files?
Backstory
I am writing a library that accesses the kernel module, uinput which allows you to create or take control of devices in /dev/input/event#, and insert events into them.
A simple usecase would ...