In practice, I often don't care about a proof of exploitability. If it looks like it might be exploitable, you better clean up your code.
-
-
Replying to @andreasdotorg
@andreasdotorg Caesar's code must be above suspicion?1 reply 0 retweets 0 likes -
Replying to @puellavulnerata
@puellavulnerata I recommend Dual-ROT13. No exploit known!1 reply 0 retweets 1 like -
Replying to @andreasdotorg
@andreasdotorg I have a proprietary, patent-pending algorithm which can apply ROT-13 *infinitely many times!1!1!* for unbreakable security2 replies 0 retweets 2 likes
Replying to @puellavulnerata
@puellavulnerata @andreasdotorg infinite ROT13 is divergent, so perhaps you're using a Riemann Zeta function? http://www.wolframalpha.com/input/?i=+%CE%B6%2813%29 …
3:17 PM - 31 May 2015
0 replies
0 retweets
1 like
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.