Developers of the OC have created voice control of the computer for people with disabilities, as well as simply for sybarites. It allows the user to enter information using a voice. The voice control on the PC only takes the first steps, but some security issues have already been revealed.
This article laconically describes cutting utmp records for intrusion analysis. These files are not text files, but sometimes the files have empty data. That’s why an attacker can delete these files if he has administrative privileges.