There is a London Wall Walk, starting at the Tower of London. Text copied from the plaques at the postern: (thanks Google Lens)
>The London Wall Walk follows the original line of the City Wall for much of its length, from the royal fortress of the Tower of London to the Museum of London, situated in the modern high-rise development of the Barbican. Between these two landmarks the Wall Walk passes surviving pieces of the Wall visible to the public and the sites of the gates now buried deep beneath the City streets. It also passes close to eight of the surviving forty-one City churches.
The Walk is 134 miles (2.8km) long and is marked by twenty-one panels which can be followed in either direction. Completion of the Walk will take between one and two hours. Wheelchairs can reach most individual sites although access is difficult at some points.
The actual best response would be to run any "unsupported" codecs in a WASM sandbox. That way you are not throwing away work, Google can stop running fuzzers against random formats from 1995, and you can legitimately say that the worst that can happen with these formats is a process crash. Everybody wins.
Let me help a bit by trying to explain the situation. If you produce something that is a million lines of code you will most likely have at least a few hundred to a few thousand bugs in there. Some of those cause crashes, some of them cause hangs, and a small percentage will cause you to increase your privileges. Combine enough of those and sooner or later you end up with RCE. The problem is that you as a defender don't necessarily have the same budget to audit the code and to close it all down to the degree that an attacker has.
You need to do an absolutely perfect job in always spotting those RCE capable issues before an attacker does. And given the numbers involved this becomes a game of statistics: if there are 200 ways to get RCE on OS 'X' then you need to find and fix all of them before attackers do. Meanwhile, your system isn't a million lines but a multitude of that, there are your applications to consider (usually of a lesser quality than the OS), the risk of a purposeful insertion of a backdoor and so on.
So I don't think it is unreasonable to presume that any OS that is out there most likely has at least a couple of these that are kept 'on ice'.
I work in security. I know all of the above. But the parent said that "any government can by RCE on any OS", that is not at all the same as saying that it is plausible that a few of the more advanced countries probably have a few critical exploits "on ice". They also stated it as a fact, not as a possibility.
I don't know what you mean by "core", but using it as a material in the center of an implanted post, such that another material faces the bone, seems like cost for no benefit.
And gold is not a good bone-facing material, because bone doesn't fuse with it.
Titanium is favored for implants because it supports osseointegration.
reply