Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It has same downside as WASM. Running precompiled bytecode is a bad for security as it always been.

It was no more than a year when a remotely exploitable WASM hole was exposed (derivatives of Spectre and co.) Knowledgeable people told that ISA level hole that can be exploited remotely over the web will be "a one minute global IT disaster" if somebody would resort to propagating it through a big adnet or paid traffic scheme.

As for WebGL as it is now, there were numerous sites on my memory that froze/crashed/rebooted both Linux and Windows systems, which means that the prime suspect there was a buggy shader as it is the only thing resembling raw instructions that can be passed to gpu through webgl.



You are being downvoted, but it is important to remember that graphics APIs were not developed with security as a first class requirement. They tend to be large, arcane, and often interfacing with large binary blob drivers on the system. Their threat surface is enormous. IMHO it is just a matter of time until exploits for WebGL and the like start showing up regularly.


Weren't Meltdown/Spectre exploitable via Javascript?


Actually, the POC required both sharedbuffer object and ASM js (actually an even worse thing than a bytecode)


Yes




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: