So How Does it Work?
Memory-based attacks work by targeting specific function locations, CPI registers, among others.
Polyverse randomly changes all of these targeting details at the binary level. We take source code and run it through a polymorphic compiler,
changing register usage, function locations, import tables, and so on to produce individually unique binaries that are semantically equivalent.
We then take the compiler and apply it to the totality of the Linux stack. These binaries are delivered through a standard package repository
for your favorite version of Linux. Simply add Polyverse to the front of your mirror list, and then you're protected!