Linux penguin π§ FOSS flosser π₯οΈ privacy protector π crypto king βΏ
Best OS: Arch btw
Best console: Wii
Best Game: Cities: Skylines
From the lead developer: Code that doesnβt get executed cannot be exploited. Itβs true that, when exploiting a vulnerability (in reachable code), you can take advantage of everything loaded into the program memory to take control of the execution, including unreachable code. But youβre assuming thereβs a prior critical vulnerability in Molly that allows to alter execution flow in the first place
From the lead developer: Code that doesnβt get executed cannot be exploited. Itβs true that, when exploiting a vulnerability (in reachable code), you can take advantage of everything loaded into the program memory to take control of the execution, including unreachable code. But youβre assuming thereβs a prior critical vulnerability in Molly that allows to alter execution flow in the first place
From the lead developer: Code that doesnβt get executed cannot be exploited. Itβs true that, when exploiting a vulnerability (in reachable code), you can take advantage of everything loaded into the program memory to take control of the execution, including unreachable code. But youβre assuming thereβs a prior critical vulnerability in Molly that allows to alter execution flow in the first place
cross-posted from: https://lemmy.ml/post/135931 β¦
The main site is located here: molly.im
The first paragraphs on the donation page:β¦
I think Molly may be trying to do something similar https://ccs.getmonero.org/proposals/vd-molly-payments-stage1.html and molly.im
I want it to post from reddit at Lemmy least. Thank you in advance!..
Iβd prefer my community subscription list to be privateβ¦
Yeah this is awesome!