-
-
Replying to @CopperheadOS
@CopperheadSec@whabib@Annaleen@fugueish it's also probably hard to change how e.g. sdcard access works without breaking changes1 reply 0 retweets 0 likes -
Replying to @CopperheadOS
@CopperheadSec@whabib@Annaleen@fugueish either painful breaking changes or a big amount of work for figuring out tricks to keep it compat1 reply 0 retweets 0 likes -
Replying to @CopperheadOS
@tehjh@whabib@Annaleen@fugueish Doing something like proxying system calls via IPC to do seccomp sandboxing would be much harder...1 reply 0 retweets 0 likes -
Replying to @CopperheadOS
@CopperheadSec@whabib@Annaleen@fugueish is that really so hard? seccomp even has support specifically for forwarding syscalls to ptrace1 reply 0 retweets 0 likes -
Replying to @CopperheadOS
@tehjh@whabib@Annaleen@fugueish Using ptrace for sandboxing is very questionable but it's great for auto-learned syscall profiles.2 replies 0 retweets 0 likes -
Replying to @CopperheadOS
@tehjh@whabib@Annaleen@fugueish It's a problem even beyond threads. Consider passing a pointer to MAP_SHARED memory.1 reply 0 retweets 0 likes
@CopperheadSec @whabib @Annaleen @fugueish so? grab mem via process_vm_readv, do syscall, write result back via process_vm_writev
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.