Which isn’t to say that it isn’t really neat…
The injection would be in the revision history (or the binary if just binary level) and therefore anyone looking to find/fix real bugs would just build with them removed.
-
-
I think this principle actually applies to proprietary binaryware too - a smart attacker will review not just the latest revision but do advanced analysis of change history, and could identify all the chaff relatively easily.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.