Comment by imoverclocked
11 hours ago
Except that emulating what is seen is surprisingly useful to find attack vectors. As a single deeper datapoint, one can look at more than just baseline behavior and delve into timing details to further refine implementation guesses.
No comments yet
Contribute on Hacker News ↗