top | item 39475412 (no title) X-Cubed | 2 years ago One approach is to copy the data to a location that you control first (eg: RAM) and perform both the check and the use of that data from the trusted location. That can be difficult though on embedded devices with constrained resources. discuss order hn newest No comments yet.
No comments yet.