conference logo

Playlist "32C3: gated communities"

Check your privileges!

Fefe

After defensive programming techniques and before attack method mitigations, the least privilege principle is our strongest weapon against exploitation. Much of the focus has been on how the admin can sandbox processes away.