Lately in the exciting world of politics and regulation there's been a lot of focus on the nature of what an exploit is, which is a bit like watching collage freshman wrestle with a subtle zen-koan <http://www.ashidakim.com/zenkoans/76thestonemind.html> buried in one of J.D. Salinger's short stories. "Perhaps if we understood the INTENT of the code, we could understand which branches are allowed and which are not allowed, which data good, and which data evil?" This is literally the level of conversation.
But you do not need exploits to hack. Sometimes you just have to be in the right place, in the right time, with the right tools. For example, as demonstrated here: https://vimeo.com/136964755 -dave
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Dailydave mailing list [email protected] https://lists.immunityinc.com/mailman/listinfo/dailydave
