Quotidien Shaarli
August 14, 2019
"Even without bugs, the CTF protocol allows applications to exchange input and read each other's content. However, there are a lot of protocol bugs that allow taking complete control of almost any other application. It will be interesting to see how Microsoft decides to modernize the protocol," Ormandy says.
Comment infiltrer un device n'importe ou ? Simple le camoufler dans l'enrobage du packaging d'un machin quelconque (jouet, peluche ...)