Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

in this case the backdoor was hidden in a nesting doll of compressed data manipulated with head/tail and tr, even replacing byte ranges inbetween. Would've been impossible to find if you were just looking at the test fixtures.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: