I wrote a post on security amplification, and for background a post on meta-execution.
I have more to say on this topic (e.g. this doesn’t make any use of the assumption that the attacker isn’t too powerful), but I think this post is the most likely point of disagreement.
I wrote a post on security amplification, and for background a post on meta-execution.
I have more to say on this topic (e.g. this doesn’t make any use of the assumption that the attacker isn’t too powerful), but I think this post is the most likely point of disagreement.