▲ | freakynit 3 days ago | |||||||
Four bits provide too few possibilities. Since memory allocations happen millions of times per minute, the chance of collisions grows very quickly, even with periodic reseeding. | ||||||||
▲ | kevincox 3 days ago | parent | next [-] | |||||||
But you only get one try. 15/16 times you get a very visible failure. It isn't great. Most users won't assume malice when an app crashes. And if they reopen it a few times your chance of succeeding goes up quickly. But this is also assuming that you need a single pointer tag to exploit something. If you need more you need to get even luckier. So it definitely isn't perfect protection. But it isn't trivial to bypass. | ||||||||
| ||||||||
▲ | saagarjha 3 days ago | parent | prev [-] | |||||||
The idea is that a tag failure crashes your process. |