Changes between Version 3 and Version 4 of EducationalAssignments/SecureTuringCompleteSandboxChallengeBuild

Changes between Version 3 and Version 4 of EducationalAssignments/SecureTuringCompleteSandboxChallengeBuild

Please note that these Trac pages are no longer being updated. Wiki contents/documentation have moved to GitHub.

Changes between Version 3 and Version 4 of EducationalAssignments/SecureTuringCompleteSandboxChallengeBuild

Please note that these Trac pages are no longer being updated. Wiki contents/documentation have moved to GitHub.

Changes between Version 3 and Version 4 of EducationalAssignments/SecureTuringCompleteSandboxChallengeBuild

Show
Ignore:
Timestamp:
08/29/12 19:09:28 (7 years ago)
Author:
justinc
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • EducationalAssignments/SecureTuringCompleteSandboxChallengeBuild

    v3 v4  
    3636 
    3737 
     38[[BR]] 
     39== Threat Model == 
     40---- 
     41 
     42You should assume that an adversary will be supplying the program and data to run in your sandbox.   This program can perform any operation supported by your sandbox.   The adversary should not be able to perform actions like write files arbitrarily with the permissions of the sandbox's user (for example, overwriting the sandbox code).    
     43 
    3844 
    3945[[BR]]