Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 7 Jul 2019 04:43:40 +0530
From:      Pratyush Yadav <me@yadavpratyush.com>
To:        Unidef <unidef@unidef.org>
Cc:        Hackers freeBSD <freebsd-hackers@freebsd.org>
Subject:   Re: Secure urls in kernel?
Message-ID:  <CA%2BX=3TLe2OShuxeLR_PANRBAkf4PiZn70-1kdDmBfFS7SBp4-w@mail.gmail.com>
In-Reply-To: <D6292A71-311C-4925-8D2F-60376384BC24@unidef.org>
References:  <D6292A71-311C-4925-8D2F-60376384BC24@unidef.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, 6 Jul 2019 at 10:57, Unidef <unidef@unidef.org> wrote:
>
> I was thinking about embedding encrypted JavaScript in a :a h ref ; tag and thought about an injection hack, so is it hard to implement some kind of pointer function exception handling in the kernel? I have to read the FreeBSD kernel book :(

Does this make any sense to any of you folks? Because all I read is gibberish.

This person's last post was similarly full of this kind of gibberish.

> Sent from my iPhone
> _______________________________________________
> freebsd-hackers@freebsd.org mailing list
> https://lists.freebsd.org/mailman/listinfo/freebsd-hackers
> To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org"



-- 
Regards,
Pratyush Yadav



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CA%2BX=3TLe2OShuxeLR_PANRBAkf4PiZn70-1kdDmBfFS7SBp4-w>