Lately in the exciting world of politics and regulation there's been a
lot of focus on the nature of what an exploit is, which is a bit like
watching collage freshman wrestle with a subtle zen-koan
<http://www.ashidakim.com/zenkoans/76thestonemind.html> buried in one of
J.D. Salinger's short stories. "Perhaps if we understood the INTENT of
the code, we could understand which branches are allowed and which are
not allowed, which data good, and which data evil?" This is literally
the level of  conversation.

But you do not need exploits to hack. Sometimes you just have to be in
the right place, in the right time, with the right tools.

For example, as demonstrated here:
https://vimeo.com/136964755

-dave

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Dailydave mailing list
[email protected]
https://lists.immunityinc.com/mailman/listinfo/dailydave

Reply via email to