Comment by twoodfin
5 months ago
What I’m imagining is essentially a supply chain attack: The victim (mistakenly) trusts the attacker to supply an encoder. The encoder appears to function normally, but in fact will subtly leak information smuggled in decoded values of the victim’s data.
Far-fetched, indeed.
No comments yet
Contribute on Hacker News ↗