Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Another attack would be to flip bits in code pages...

That the attackers illustrated it by changing public keys so they could push updates or ssh into a box doesn't mean that's all the ways they could have compromised. You can't say "I don't use SSH so I'm safe!" or anything like that.




[flagged]


The code of running processes is loaded into memory. Flipping bits in the memory can potentially modify the code.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: