Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Another attack would be to flip bits in code pages...

That the attackers illustrated it by changing public keys so they could push updates or ssh into a box doesn't mean that's all the ways they could have compromised. You can't say "I don't use SSH so I'm safe!" or anything like that.



[flagged]


The code of running processes is loaded into memory. Flipping bits in the memory can potentially modify the code.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: