Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Clients could probably hook/trap a fake buffer exploit for protocol compatibility without the security concerns. This ends up becoming a game of cat and mouse resulting in even more intricate technical workarounds and hacks.


That would be pretty hard in general because you’d have to read the code they sent and figure out what’s safe to execute.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: