| ▲ | piker 2 hours ago | |||||||||||||||||||||||||
That's true for the full obfuscation, but not for the replacement. For replacement there's really nothing like it. We just shared the full obfuscation as just a PoC. [Edit: The point here is not to prove some massive "gotcha", but rather demonstrate that there are a whole class of vulnerabilities that these pipelines are subject to. There will be follow-up posts that pack much more punch.] | ||||||||||||||||||||||||||
| ▲ | echoangle 2 hours ago | parent [-] | |||||||||||||||||||||||||
Assuming you’re the author since you also posted it: I just stealth-edited my comment, could you maybe talk about the threat model a bit more? I am not a lawyer so I don’t really see when I would want to do this. Also, I hope the „lame exploit“ I just edited out was not too offensive, it’s always great when people try to find attacks to make systems more safe. | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||