Posted by: skeeto
Posting time: 5.4 years ago on 7/6/2015 4:50:30 PM
Last edit time: never edited.
Archived on: 2/12/2017 1:51:00 AM
Views: 48
SCP: 5
5 upvotes, 0 downvotes (100% upvoted it)
~51 user(s) here now
Everything programming! Language agnostic subvoat, general programming talk. Educational and programming technology related submissions are welcomed!
Beware of bugs in the above code; I have only proved it correct, not tried it. Donald Knuth
Beware of bugs in the above code; I have only proved it correct, not tried it.
Donald Knuth
NSFW: No Authorized: No Anon: No Private: No Type: Default
Content violates spam guidelines
Content contains or links to content that is illegal
Content contains personal information that relates to a Voat users real world or online identity
Content or User violates User Agreement
Hi, it looks like you're new. Welcome to Voat!
Voat is a censorship-free community platform where content is submitted, organized, moderated and voted on (ranked) by the users.
Archived Zeroing buffers is insufficient (daemonology.net)
submitted 5.4 years ago by skeeto
[–] dvhh 0 points 0 points 0 points (+0|-0) 5.4 years ago
Let's be honest there and just say that everyone sucks at security because nobody exactly knows how it is working.
[–] Urtie 0 points 0 points 0 points (+0|-0) 5.4 years ago
That's a good, but disturbing point. Not to mention, there are plenty of managed languages out there that might copy the data around too.
Is there even a way to deal with this without having the kernel get involved at program exit?
Sort: Top
[–] dvhh ago
Let's be honest there and just say that everyone sucks at security because nobody exactly knows how it is working.
[–] Urtie ago
That's a good, but disturbing point. Not to mention, there are plenty of managed languages out there that might copy the data around too.
Is there even a way to deal with this without having the kernel get involved at program exit?