On 9/27/25 11:35 PM, Amit wrote:

> Let's assume that there are 2 (or more) different software and all the
> functions in all the software are secure and these software are interacting
> with each other. Then how can they be hacked? Can someone give an example.
> 
> I don't agree with theoretical assumptions.
> 
> Someone also mentioned that secure functions having limits on arguments can
> result in DoS. In my opinion, DoS is better than getting hacked.
> 
> But still, the main point is that can someone give an example of how a
> software made up of all secure functions be hacked? I request for an
> example (not theoretical statements).
> 
> Or, some example that happened in the past in the real world? I will
> analyze that.


Theoretical assumption: people who think they know how to write secure
functions never discover they were wrong and their functions were buggy
and insecure.

:) :)


-- 
Eli Schwartz

Attachment: OpenPGP_signature.asc
Description: OpenPGP digital signature

Reply via email to