Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> the damage they could do is hardly mitigated by Wayland.

I disagree. How do you hijack interprocess communication on a Wayland device? I can tell you in very certain steps how to manipulate an x11 client but outside hijacking /dev/ I can't imagine a similar attack on Wayland.



If you aren't sandboxes you can edit the user's environment to swap out their programs with backdoored copies.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: