Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

That paper focuses on breaking the harness, the same hack applies to all tasks. Here we are breaking tasks individually. If these were put on a different, more secure harness, most of the exploits would still work.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: