TE
TechEcho
Home
24h Top
Newest
Best
Ask
Show
Jobs
English
GitHub
Twitter
Home
Cryptographic Data Structures
62 points
by
bren2013
about 10 years ago
1 comment
rawnlq
about 10 years ago
Collapse
What are some applications of this? If an attacker has access to memory there's not much left you can do right?<p>Or is the use case similar to why you would want to zero out the memory used to store password strings?
评论 #9562402 未加载