Editing 2556: Turing Complete

Jump to: navigation, search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 18: Line 18:
 
However, another reason to make a device run arbitrary code is to {{w|Arbitrary code execution|breach security.}}  If the owner of a system assumes that it can only do one specific thing, like operate a dishwasher, they may not take precautions against hacking.  But if the system is actually Turing-complete, a hacker could potentially make it do something else, like become part of a {{w|botnet}}.  Therefore, "this is actually Turing-complete" could be the prelude to a complicated hacking attempt.  Sophisticated hacking attacks are often the work of hackers that have the support of a government, or {{w|nation-state}}.
 
However, another reason to make a device run arbitrary code is to {{w|Arbitrary code execution|breach security.}}  If the owner of a system assumes that it can only do one specific thing, like operate a dishwasher, they may not take precautions against hacking.  But if the system is actually Turing-complete, a hacker could potentially make it do something else, like become part of a {{w|botnet}}.  Therefore, "this is actually Turing-complete" could be the prelude to a complicated hacking attempt.  Sophisticated hacking attacks are often the work of hackers that have the support of a government, or {{w|nation-state}}.
  
βˆ’
The {{w|FORCEDENTRY|ForcedEntry}} exploit is a way that was developed to allow {{w|PDF}} files to force malware onto various devices. PDF files are normally used to present documents.  The exploit uses a PDF's ability to do logic operations on pixels to implement [https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html a simple virtual CPU] within one of the PDF renderer's decompression functions. Constructing a CPU in this way is similar to how a hardware CPU is made of individual logic gates.  ForcedEntry was publicized a few days before this comic came out.
+
The {{w|FORCEDENTRY|ForcedEntry}} exploit is a way that was discovered to allow {{w|PDF}} files to force malware onto various devices. In particular, the exploit uses a PDF's ability to do logic operations on pixels to implement [https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html a simple virtual CPU] within one of the PDF renderer's decompression functions. Constructing a CPU in this way is similar to how a hardware CPU is made of individual logic gates.  In the title-text it is suggested that this mechanism can be used for what might be more legal and practical purposes, although this might be up to some interpretation depending upon who has the right (and permission) to do what.
βˆ’
 
 
βˆ’
In the title-text it is suggested that this mechanism can be used for what might be more legal and practical purposes, although this might be up to some interpretation depending upon who has the right (and permission) to do what.
 
  
 
A {{w|Solution stack|tech stack}} is one shorthand way of describing the way an integrated grouping of communicating software packages provides everything from the deepest data handling (even as low-level as an operating system itself) to the user interface. All of these will normally be on a computer (or possibly many of them, whether locally or distributed worldwide) and if a sufficiently functional surrogate system is capable of emulating this (computing what the original computer(s) would do) then it can be considered to effectively ''be'' the same stack of technology and duplicate or replace the originals.
 
A {{w|Solution stack|tech stack}} is one shorthand way of describing the way an integrated grouping of communicating software packages provides everything from the deepest data handling (even as low-level as an operating system itself) to the user interface. All of these will normally be on a computer (or possibly many of them, whether locally or distributed worldwide) and if a sufficiently functional surrogate system is capable of emulating this (computing what the original computer(s) would do) then it can be considered to effectively ''be'' the same stack of technology and duplicate or replace the originals.

Please note that all contributions to explain xkcd may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see explain xkcd:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel | Editing help (opens in new window)