logoalt Hacker News

imoverclockedtoday at 3:50 AM0 repliesview on HN

Except that emulating what is seen is surprisingly useful to find attack vectors. As a single deeper datapoint, one can look at more than just baseline behavior and delve into timing details to further refine implementation guesses.