• @Darkassassin07@lemmy.ca
    link
    fedilink
    English
    -92 months ago

    Potato, potato…

    Whether we call them ‘undocumented commands’ or a ‘backdoor’, the affect is more or less the same; a series of high-level commands not listed within the specs, preventing systems engineers/designers from planning around vulnerabilities and their potential for malicious use.

    • @futatorius@lemm.ee
      link
      fedilink
      English
      02 months ago

      In that case, every stack that you use is riddled with those and we are all hosed. And yet somehow your computer, your phone and the internet keep on working most of the time.