>In colloquial usage, the terms "Turing-complete" and "Turing-equivalent" are used to mean that any real-world general-purpose computer or computer language can approximately simulate the computational aspects of any other real-world general-purpose computer or computer language.
Interesting sidenote: there's an NSO iPhone exploit that created it's own virtual machine inside an image decoder.
Basically they took a buffer overflow and used it to create a whole turing complete virtual machine.
ie you could create a Virtual Machine running inside sed that could run Windows or anything else.
https://en.wikipedia.org/wiki/Turing_completeness
>In colloquial usage, the terms "Turing-complete" and "Turing-equivalent" are used to mean that any real-world general-purpose computer or computer language can approximately simulate the computational aspects of any other real-world general-purpose computer or computer language.
Interesting sidenote: there's an NSO iPhone exploit that created it's own virtual machine inside an image decoder.
Basically they took a buffer overflow and used it to create a whole turing complete virtual machine.
It's insane. https://news.ycombinator.com/item?id=29568625