Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Not sure i see how that can be fixed in software, if the attacker has control over the hardware (or sit closer to it than the software you are using).


The point being made here is that if I run an xterm on your machine (forwarded to the X server on my machine), then you can now access everything happening in the X server on my machine.


Noted. What puzzles me is that this has not been sorted in all the years, without doing a complete ground up recreation...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: