Some DRM systems abuse security designs. Regular applications aren’t meant to be running at kernel level (ring 0) and should be running sandboxed at a user level. There are kernel dev blog posts that talk about this. It’s basically like making an arm move by poking a brain with a stick. Anything that can then access that stick or the hole you created can make at brain do whatever they want.
Some DRM systems abuse security designs. Regular applications aren’t meant to be running at kernel level (ring 0) and should be running sandboxed at a user level. There are kernel dev blog posts that talk about this. It’s basically like making an arm move by poking a brain with a stick. Anything that can then access that stick or the hole you created can make at brain do whatever they want.