Untrusted environment: Difference between revisions
Content added Content deleted
(Added Kotlin) |
m (→{{header|Kotlin}}: Corrected spelling mistake.) |
||
Line 55: | Line 55: | ||
It is possible to run untrusted bytecode within a 'sandbox' which prevents it from interfering with the underlying environment. However, programs can also be cryptographically signed by by a recognized authority and users can then allow such programs to be run within a trusted environment. |
It is possible to run untrusted bytecode within a 'sandbox' which prevents it from interfering with the underlying environment. However, programs can also be cryptographically signed by by a recognized authority and users can then allow such programs to be run within a trusted environment. |
||
Of course, no system is perfect and a number of |
Of course, no system is perfect and a number of vulnerabilities have been discovered in these mechanisms over the years and will doubtless continue to be discovered in the future given the ubiquity of the Java Platform and hence its attractiveness to hackers. |
||
=={{header|PARI/GP}}== |
=={{header|PARI/GP}}== |