
12-12-2008, 12:02 AM
|
 |
XNU-Dev Voodoo Labs
|
|
Join Date: Sep 2008
Location: Germany / India
Posts: 24
|
|
If it's anonymous, how do you make sure the kext is legit and not some rogue code? Since kexts run in kernel space with full access to hardware, it might not be something I want to use unless I can hold someone accountable if something blows up in my face.
Also, comments on the legality ?
|