Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

Isn this ultimately a case of users running untrusted code?

0
Posted

Isn this ultimately a case of users running untrusted code?

0

Yes. In the end, the malicious user must trick the other user into allowing his code to run, so in many ways this is similar to a Trojan horse attack. However, the methods for initiating the execution of the malicious user’s attack lend themselves to being so well camouflaged that even a cautious user might not realize that he is causing code to run.

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123