Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

If you use a binary distribution, you're already owned

Name: Anonymous 2016-05-31 10:54

Forget the days of hunting for exploits and probing for attack vectors.

The big boys have automated software systems for quickly identifying whole classes of exploits in software binaries, and frameworks for automatically generating rootkits using SAT/SMT solvers, concolic testing and attack synthesis. In a matter of minutes, they can have a print out of all of the exploits they can use, and software already to go to own your ass.

How the hell are you supposed to protect against this? Why are so many idiot project maintainers chasing after reproducible builds when this is exactly the type of shit the big boys love? Why aren't the major compiler projects invested in developing SMT-based code generators that can create different permutations of programs from random seeds that can possibly thwart this?

Name: Anonymous 2016-06-01 22:48

>>18
D-Wave's architecture differs from traditional quantum computers (none of which exist in practice as of today). It is unable to simulate a universal quantum computer and, in particular, cannot execute Shor's algorithm.

in other words, NSA can do nothing with these toys. Just your typical government kickback, when some smart Jewish boy at NSA gets paid a million for making government to buy these phony machines.

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List