logoalt Hacker News

CaptainFeveryesterday at 7:08 PM2 repliesview on HN

[flagged]


Replies

yunnppyesterday at 7:40 PM

Thank you for your kind comment. I recommend you watch the actual talk, and then understand what exploiting RCEs in things like the Linux kernel at such a scale that defenders can no longer keep up with actually means. The latter is their claim, not mine.

Also realize that, unlike a security researcher, an attacker doesn't necessarily need to review the model out carefully to filter out the slop before a bug submission. They mostly just need to run the shit.

show 1 reply
tostiyesterday at 7:27 PM

More like, if you pay a fee to use a service, you can find the bombs already hidden somewhere in your premises.

show 1 reply