Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

>You can't inspect a stack from inside the attacker's process and expect that to do anything at all, let alone control access to a resource.

See the article:

>If user code is running on a sufficiently advanced platform, one not administered by the user, then a library can safely manipulate resources that aren't accessible to the rest of the program. For example:

>[the list quoted above]



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: