Linux penguin 🐧 FOSS flosser 🖥️ privacy protector 🔒 crypto king ₿
Best OS: Arch btw
Best console: Wii
Best Game: Cities: Skylines
From the lead developer: Code that doesn’t get executed cannot be exploited. It’s true that, when exploiting a vulnerability (in reachable code), you can take advantage of everything loaded into the program memory to take control of the execution, including unreachable code. But you’re assuming there’s a prior critical vulnerability in Molly that allows to alter execution flow in the first place
From the lead developer: Code that doesn’t get executed cannot be exploited. It’s true that, when exploiting a vulnerability (in reachable code), you can take advantage of everything loaded into the program memory to take control of the execution, including unreachable code. But you’re assuming there’s a prior critical vulnerability in Molly that allows to alter execution flow in the first place
From the lead developer: Code that doesn’t get executed cannot be exploited. It’s true that, when exploiting a vulnerability (in reachable code), you can take advantage of everything loaded into the program memory to take control of the execution, including unreachable code. But you’re assuming there’s a prior critical vulnerability in Molly that allows to alter execution flow in the first place
I think Molly may be trying to do something similar https://ccs.getmonero.org/proposals/vd-molly-payments-stage1.html and molly.im
I use this. It redirects Twitter, YouTube, Instagram, reddit, google maps, simply translate (super cool, it lets you translate with google, bing etc.) and even Wikipedia. https://github.com/SimonBrazell/privacy-redirect
Very cool! Thank you!