Comment by disgruntledphd2
1 day ago
> Except when they "extract" something that wasn't in the source. And now what, assuming you can even detect the tainted data at all?
I mean, this is much less common than people make it out to be. Assuming that the context is there it's doable to run a bunch of calls and take the majority vote. It's not trivial but this is definitely doable.
No comments yet
Contribute on Hacker News ↗