• froztbyte@awful.systems
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 months ago

    you know what

    I’ll do you the courtesy of an even mildly thorough response, despite the fact that this is not the place and that it’s not my fucking job

    one of the literal pillars of security intrusions/research/breakthroughs is in the field of exploiting side effects. as recently as 3 days ago there was some new stuff published about a fun and ridiculous way to do such things. and that kind of thing can be done in far more types of environments than you’d guess. people have managed large-scale intrusions/events by the simple matter of getting their hands on a teensy little fucking bit of string.

    there are many ways this shit can be abused. and now I’m going to stop replying to this section, on which I’ve already said more than enough.