What can confirm a root compromise?