Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

To my understanding it's still hard to exploit this to steal information / break access / etc just because you'd need to know where the right bits were. On the other hand, if all we want to do is break our adversary's process / crash it / make it perform arbitrary incorrect behavior, this seems substantially easier to accomplish even if we have no idea at all which bits we are flipping.


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: