[OffTopic] A vulnerability postmortem on Network Security Services

Ola Fosheim Grøstad ola.fosheim.grostad at gmail.com
Fri Dec 3 08:45:06 UTC 2021

On Friday, 3 December 2021 at 06:56:53 UTC, Paulo Pinto wrote:
> That is how SPARC ADI, ARM MTE work.
> Intel borked their MPX execution, so who knows if they will 
> come up with something up, given that iOS and Android are now 
> making use of hardware memory tagging.

Where did you find info on iOS and Android shipping with memory 

According to the ARM MTE paper it adds 4 bits for every 16 bytes 
and is probabilistic in nature, so it does not work with large 
offsets. It also forces 16 byte alignment of objects on the stack.

More information about the Digitalmars-d mailing list