Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

There's no point in checking it. If another user is running an executable that you have full control over, then you can make him run anything you want anyways.


But its not control over the binary executable file, its the control over the event?

Or am I really missing something here, and you set up the object with the security token used on the binary file?

My question (sorry if it's super dumb and I'm missing something) is what permissions are needed to communicate via the event?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: