Changes between Version 4 and Version 5 of EducationalAssignments/SecureTuringCompleteSandboxChallengeBuild

Changes between Version 4 and Version 5 of EducationalAssignments/SecureTuringCompleteSandboxChallengeBuild

Please note that these Trac pages are no longer being updated. Wiki contents/documentation have moved to GitHub.

Changes between Version 4 and Version 5 of EducationalAssignments/SecureTuringCompleteSandboxChallengeBuild

Please note that these Trac pages are no longer being updated. Wiki contents/documentation have moved to GitHub.

Changes between Version 4 and Version 5 of EducationalAssignments/SecureTuringCompleteSandboxChallengeBuild

Show
Ignore:
Timestamp:
08/29/12 19:11:05 (7 years ago)
Author:
justinc
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • EducationalAssignments/SecureTuringCompleteSandboxChallengeBuild

    v4 v5  
    4040---- 
    4141 
    42 You should assume that an adversary will be supplying the program and data to run in your sandbox.   This program can perform any operation supported by your sandbox.   The adversary should not be able to perform actions like write files arbitrarily with the permissions of the sandbox's user (for example, overwriting the sandbox code).    
     42You should assume that an adversary will be supplying the program and data to run in your sandbox.   The adversary must not be able to perform actions like write files arbitrarily with the permissions of the sandbox's user (for example, overwriting the sandbox code).    
    4343 
    4444