@Fuego So, what you're saying is that there are multiple avenues for an attacker to exploit the concept of optimization, because optimization represents the system interacting with stuff outside the software's control while reporting to the software that everything is normal. And any gap between what a system does and what it reports it did is a potential vector. And that's how we get Twitch Plays Amazon, or whatever the next TASBot masterpiece is.
@Fuego anybody who wants that C book, I have a give-away-able copy as well
Wireless hacking exposed, C programming, and Database hackers handbook are now spoken for
Mixie trash
- she / her -