On 9/27/25 11:35 PM, Amit wrote: > Let's assume that there are 2 (or more) different software and all the > functions in all the software are secure and these software are interacting > with each other. Then how can they be hacked? Can someone give an example. > > I don't agree with theoretical assumptions. > > Someone also mentioned that secure functions having limits on arguments can > result in DoS. In my opinion, DoS is better than getting hacked. > > But still, the main point is that can someone give an example of how a > software made up of all secure functions be hacked? I request for an > example (not theoretical statements). > > Or, some example that happened in the past in the real world? I will > analyze that.
Theoretical assumption: people who think they know how to write secure functions never discover they were wrong and their functions were buggy and insecure. :) :) -- Eli Schwartz
OpenPGP_signature.asc
Description: OpenPGP digital signature
