Warning: Things I explain here are very dangerous. You can’t use this if you do not understand your threat model.