DEP and CMF?

Recent exploits have exposed a weakness that may be used to bypass hardware DEP. While the alarmist response was not quite on point, it does present some problems for security, as discussed here:

Will CMF, when mature, contribute to stop this kind of exploit?

Is there a white paper or Comodo link to the general theory behind CMF?

For a full, detailed answer, please read: