Linux Rootkits Part 4: Backdooring PRNGs by Interfering with Char Devices