What are some exploitable memory corruption attacks I have not listed?

Dangling pointer(heap)
Use After Free(heap)
Double Free(heap)
Off by one(stack)
Integer Overflow(stack)
Unused Variable(stack and heap)
underrun(stack and heap)
race condition(stack and heap)

From what I’ve seen unused variable and under… Continue reading What are some exploitable memory corruption attacks I have not listed?

Would this way of going about protecting users’ data in use be secure, or overkill?

I’ve got information security as high as possible with my Flutter app so far with encryption and proper storage for data at rest as well as data in transit. With this question I’m only aiming for protecting data at rest.
If I did something… Continue reading Would this way of going about protecting users’ data in use be secure, or overkill?