Comment by comex
7 months ago
Yes, that’s the OP’s main point, but their choice of examples suggests that they are also thinking about trusted input.
7 months ago
Yes, that’s the OP’s main point, but their choice of examples suggests that they are also thinking about trusted input.
In the context of security holes.