Security Cryptography Whatever cover image

Apple’s Memory Integrity Enforcement

Security Cryptography Whatever

00:00

How use-after-free and type confusion exploits work

Thomas and David walk through dangling pointers, write-what primitives, and why those primitives have been historically critical.

Play episode from 08:09
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app