Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It's weird to me that it's 2026 and this is still a controversial argument. Deep, tricky memory corruption exploit development is done on closed-source targets, routinely, and the kind of backdoor/bugdoor people conjure in threads about E2EE are much simpler than those bugs.

It was a pretty much settled argument 10 years ago, even before the era of LLVM lifters, but post-LLM the standard of care practice is often full recompilation and execution.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: