Editing 2556: Turing Complete
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 18: | Line 18: | ||
However, another reason to make a device run arbitrary code is to {{w|Arbitrary code execution|breach security.}} If the owner of a system assumes that it can only do one specific thing, like operate a dishwasher, they may not take precautions against hacking. But if the system is actually Turing-complete, a hacker could potentially make it do something else, like become part of a {{w|botnet}}. Therefore, "this is actually Turing-complete" could be the prelude to a complicated hacking attempt. Sophisticated hacking attacks are often the work of hackers that have the support of a government, or {{w|nation-state}}. | However, another reason to make a device run arbitrary code is to {{w|Arbitrary code execution|breach security.}} If the owner of a system assumes that it can only do one specific thing, like operate a dishwasher, they may not take precautions against hacking. But if the system is actually Turing-complete, a hacker could potentially make it do something else, like become part of a {{w|botnet}}. Therefore, "this is actually Turing-complete" could be the prelude to a complicated hacking attempt. Sophisticated hacking attacks are often the work of hackers that have the support of a government, or {{w|nation-state}}. | ||
β | The {{w|FORCEDENTRY|ForcedEntry}} exploit is a way that was | + | The {{w|FORCEDENTRY|ForcedEntry}} exploit is a way that was discovered to allow {{w|PDF}} files to force malware onto various devices. In particular, the exploit uses a PDF's ability to do logic operations on pixels to implement [https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html a simple virtual CPU] within one of the PDF renderer's decompression functions. Constructing a CPU in this way is similar to how a hardware CPU is made of individual logic gates. In the title-text it is suggested that this mechanism can be used for what might be more legal and practical purposes, although this might be up to some interpretation depending upon who has the right (and permission) to do what. |
β | |||
β | In the title-text it is suggested that this mechanism can be used for what might be more legal and practical purposes, although this might be up to some interpretation depending upon who has the right (and permission) to do what. | ||
A {{w|Solution stack|tech stack}} is one shorthand way of describing the way an integrated grouping of communicating software packages provides everything from the deepest data handling (even as low-level as an operating system itself) to the user interface. All of these will normally be on a computer (or possibly many of them, whether locally or distributed worldwide) and if a sufficiently functional surrogate system is capable of emulating this (computing what the original computer(s) would do) then it can be considered to effectively ''be'' the same stack of technology and duplicate or replace the originals. | A {{w|Solution stack|tech stack}} is one shorthand way of describing the way an integrated grouping of communicating software packages provides everything from the deepest data handling (even as low-level as an operating system itself) to the user interface. All of these will normally be on a computer (or possibly many of them, whether locally or distributed worldwide) and if a sufficiently functional surrogate system is capable of emulating this (computing what the original computer(s) would do) then it can be considered to effectively ''be'' the same stack of technology and duplicate or replace the originals. |