Hacker News new | past | comments | ask | show | jobs | submit login

Indeed, I was trying to give well-known examples. Some of the more interesting, not widely-deployed PaX mitigations are more accurate here.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: