TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Cryptographic Data Structures

62 pointsby bren2013about 10 years ago

1 comment

rawnlqabout 10 years ago
What are some applications of this? If an attacker has access to memory there&#x27;s not much left you can do right?<p>Or is the use case similar to why you would want to zero out the memory used to store password strings?
评论 #9562402 未加载