Untrusted environment: Difference between revisions

Content added Content deleted
(Added Kotlin)
m (→‎{{header|Kotlin}}: Corrected spelling mistake.)
Line 55: Line 55:
It is possible to run untrusted bytecode within a 'sandbox' which prevents it from interfering with the underlying environment. However, programs can also be cryptographically signed by by a recognized authority and users can then allow such programs to be run within a trusted environment.
It is possible to run untrusted bytecode within a 'sandbox' which prevents it from interfering with the underlying environment. However, programs can also be cryptographically signed by by a recognized authority and users can then allow such programs to be run within a trusted environment.


Of course, no system is perfect and a number of vulnerablities have been discovered in these mechanisms over the years and will doubtless continue to be discovered in the future given the ubiquity of the Java Platform and hence its attractiveness to hackers.
Of course, no system is perfect and a number of vulnerabilities have been discovered in these mechanisms over the years and will doubtless continue to be discovered in the future given the ubiquity of the Java Platform and hence its attractiveness to hackers.


=={{header|PARI/GP}}==
=={{header|PARI/GP}}==