Steven D'Aprano <[EMAIL PROTECTED]> writes:
> > It certainly does apply, if you're maintaining a program and someone
> > submits a patch.  In that case you neither click nor type the
> > character.  You'd normally just make sure the patched program passes
> > the existing test suite, and examine the patch on the screen to make
> > sure it looks reasonable.  The phishing possibilities are obvious.
> 
> Not to me, I'm afraid. Can you explain how it works? A phisher might be
> able to fool a casual reader, but how does he fool the compiler into
> executing the wrong code?

The compiler wouldn't execute the wrong code; it would execute the code
that the phisher intended it to execute.  That might be different from
what it looked like to the reviewer.
-- 
http://mail.python.org/mailman/listinfo/python-list

Reply via email to