Recently I was asked if a object supported dynamic loading. I believe the underlying question is "shared object" versus "dynamic shared object". The best I can tell, I getting back lots of useless information during a search. (1) How does on tell a SO and DSO apart? (2) How does one stop an adversary from using them incorrectly? I was thinking a flag might be present, similar to RFC3514 - The Security Flag in the IPv4 Header. That is, there's a gentleman's agreement if a particular bit is set, the attacker will not misuse the object.