Originally posted by stormcrow
View Post
Part of agressive optimalizations is making code less reliant on branching and memory layout being always the same (like unrolling the loop) what actually means harder exploitation.
So i wouldn't be afraid for that value.
What I could be afraid potentially is that there is tons of security engineers testing security of kernel on default O2 configuration, but very few at O3. That means even if O3 on average is more likely to remove security vulnerabilities then introduce them, it still means someone probably took care of many O2 security vulnerabilities but not in case of O3.
Comment