I want to threat model the USER. Has anyone written a krnl executor tutorial that shows how NOT to be socially engineered by shady installers? Or a krnl executor tips latest version list that is purely OPSEC (vm isolation, network filtering, snapshot rollback)? If you have a krnl executor walkthrough where the “takeaway” is user-risk education, that’s exactly what I need to cite.