Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

If you use a binary distribution, you're already owned

Name: Anonymous 2016-05-31 10:54

Forget the days of hunting for exploits and probing for attack vectors.

The big boys have automated software systems for quickly identifying whole classes of exploits in software binaries, and frameworks for automatically generating rootkits using SAT/SMT solvers, concolic testing and attack synthesis. In a matter of minutes, they can have a print out of all of the exploits they can use, and software already to go to own your ass.

How the hell are you supposed to protect against this? Why are so many idiot project maintainers chasing after reproducible builds when this is exactly the type of shit the big boys love? Why aren't the major compiler projects invested in developing SMT-based code generators that can create different permutations of programs from random seeds that can possibly thwart this?

Name: Anonymous 2016-05-31 14:34

>>8
Well, I'm reasonably ``off the grid'', but it's not a lifestyle choice that most people are willing to make. There's a tradeoff between privacy and convenience.

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List