Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

GP is talking about executable blobs (drivers) more than anything. Yes, binary protocols will lead to binary test blobs, so what.


The attack was embedded in a binary test blob, or did you just not happen to read anything about the xy attack?


You can't avoid having to have binary blobs of data. And again, GP was talking about closed-source drivers, not specifically the xz attack.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: