Buggy Security Guidance from Apple

Jon Kalb: The document is on the right track to a solution. The key is to be able to detect the overflow situation without triggering it. Or in this specific case, detect that n * m would overflow, without actually calculating the value of bytes. But putting the detection after the calculation of bytes defeats … Continue reading Buggy Security Guidance from Apple