Skip to main content
The 2024 Developer Survey results are live! See the results
forest's user avatar
forest's user avatar
forest's user avatar
forest
  • Member for 8 years, 3 months
  • Last seen more than a month ago
  • Laniakea
244 votes
11 answers
61k views

Why is Math.random() not designed to be cryptographically secure?

29 votes
1 answer
6k views

DMA attacks despite IOMMU isolation

28 votes
2 answers
3k views

Methods root can use to elevate itself to kernel mode

18 votes
6 answers
4k views

Mitigating forensic memory acquisition when an attacker has physical access to a workstation

15 votes
1 answer
1k views

Random seed not propagating to the entropy pools in a timely manner

15 votes
1 answer
985 views

JPEG artifacts leaking information about redacted contents

14 votes
2 answers
2k views

Recovery of EEPROM data after bulk erase operation

12 votes
1 answer
1k views

Entropy sources used by modern Windows

11 votes
1 answer
2k views

Why does TLS 1.3 deprecate custom DHE groups?

11 votes
2 answers
1k views

What are the new MDS attacks, and how can they be mitigated?

10 votes
2 answers
906 views

How effective is Windows KDP for exploit mitigation in practice?

10 votes
3 answers
736 views

Simple way to safely paste text from website into terminal

10 votes
2 answers
3k views

Methods of cold boot attacks in the wild

9 votes
0 answers
416 views

Authentication using SysRq

9 votes
1 answer
2k views

Mitigating the new attack on WPA2 involving PMKID

8 votes
1 answer
692 views

Mitigating Meltdown by checking the faulting address in every page fault?

7 votes
2 answers
6k views

Can mprotect() be used to change the permissions of .rodata?

7 votes
1 answer
346 views

What exactly is CVE-2021-23978 (from MSFA2021-08 in Mozilla Firefox)?

7 votes
1 answer
855 views

How sensitive are acoustic side-channels to compression with a narrowband codec?

6 votes
1 answer
579 views

Can any of the INTEL-SA-00086 vulnerabilities be exploited by an unprivileged user?

5 votes
1 answer
3k views

LUKS2 on-disk format specifications

5 votes
1 answer
1k views

How does GCC's -mmitigate-rop work?

5 votes
1 answer
443 views

What buses carrying sensitive information on a running computer are vulnerable to sniffing?

5 votes
1 answer
517 views

Does OpenSSH use padding of random lengths?

5 votes
1 answer
938 views

What use does a TPM have for accurate timekeeping?

5 votes
3 answers
3k views

Is the Linux kernel vulnerable to LazyFP (CVE-2018-3665)?

4 votes
1 answer
826 views

Can a JTAG device be attached to a running system?

3 votes
2 answers
1k views

Is using cat -v an appropriate way to sanitize untrusted text?

3 votes
1 answer
569 views

Is microcode physically able to mitigate Meltdown?

3 votes
0 answers
506 views

Minimum set of ACS features to secure remote PCIe devices