I mean, you've got code running in your machine that could do anything.
But by that time you've got code running on your machine.
And so the idea is that any techniques which can be used to get code running on someone's machine has been done.
It's in real mode, which is the way this code runs.
The more fundamental issue is whether I can get hostile code running on your machine.
But there are still escalated code running on my machine.
Spare me the garbage that we need real code running on the client.
The familiar codes are running out of numbers, but no one wants to be the one to give them up.
But what really counts is the code running inside.
There are some important differences, but much code written for S runs unaltered.