Pickled objects over the network
Steve Holden
steve at holdenweb.com
Mon Jul 23 13:33:10 EDT 2007
Hendrik van Rooyen wrote:
> "Steve Holden" <steve at h..b.com> wrote:
>
>> Yes.
>
> Why?
>
It's difficult to establish, and then correctly implement, almost any
security protocol without leaving cracks that attackers can lever open
and use to inject code into your process's memory space.
By all means go ahead and hack on pickle to do what you want to. Just
don't claim your solution is secure without a thorough review.
regards
Steve
--
Steve Holden +1 571 484 6266 +1 800 494 3119
Holden Web LLC/Ltd http://www.holdenweb.com
Skype: holdenweb http://del.icio.us/steve.holden
--------------- Asciimercial ------------------
Get on the web: Blog, lens and tag the Internet
Many services currently offer free registration
----------- Thank You for Reading -------------
More information about the Python-list
mailing list