<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: tiraniddo</title><link>https://news.ycombinator.com/user?id=tiraniddo</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Mon, 06 Apr 2026 08:02:49 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=tiraniddo" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by tiraniddo in "\Device\Afd, or, the Deal with the Devil that makes async Rust work on Windows"]]></title><description><![CDATA[
<p>The article also felt like Rust does it this way because all these other projects which came before it did it this way. Someone originated the technique and no one questions its validity, without seeing if there was an alternative method to achieve the same result.<p>I did spend about 20 minutes looking into this, it seems that there's an (admittedly undocumented) IOCTL which is in the Winsock headers (MSWsock.h) called SIO_EXT_POLL which seems to just use the poll device IO control code and so they could probably do this without messing with low-level AFD weirdness.<p>That said you'd think with Microsoft going all in on Rust, last I heard at least, that they could find a way to re-implement this code correctly. Hell, if they at least documented the IOCTL they could probably get co-pilot to do it for them ;)</p>
]]></description><pubDate>Tue, 14 Mar 2023 11:41:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=35149961</link><dc:creator>tiraniddo</dc:creator><comments>https://news.ycombinator.com/item?id=35149961</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35149961</guid></item><item><title><![CDATA[New comment by tiraniddo in "Microsoft’s new Windows prompts try to stop people downloading Chrome"]]></title><description><![CDATA[
<p>That dialog is only on Google websites, I'm not sure how that is abusing its power as you can choose not to use Google products (hard but doable). Regardless Microsoft are already doing that to push Edge as well, try going to microsoft.com using a non-Edge browser and you'll see a banner appear. But this goes much further and actively bakes those prompts into the OS and browser, you wonder how far they'll take it?</p>
]]></description><pubDate>Thu, 02 Dec 2021 16:44:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=29418540</link><dc:creator>tiraniddo</dc:creator><comments>https://news.ycombinator.com/item?id=29418540</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29418540</guid></item><item><title><![CDATA[New comment by tiraniddo in "Using the Linux kernel's Case-insensitive feature in Ext4"]]></title><description><![CDATA[
<p>If you enabled the posix subsystem NTFS became case sensitive as well, although most API passed a flag to disable that for Win32 file calls.<p>It’s interesting that Microsoft effectively added the reverse feature to NTFS [1] to support per-directory case sensitive files to be more compatible with Linux.<p>[1] <a href="https://www.tiraniddo.dev/2019/02/ntfs-case-sensitivity-on-windows.html" rel="nofollow">https://www.tiraniddo.dev/2019/02/ntfs-case-sensitivity-on-w...</a></p>
]]></description><pubDate>Sun, 30 Aug 2020 17:17:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=24324233</link><dc:creator>tiraniddo</dc:creator><comments>https://news.ycombinator.com/item?id=24324233</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=24324233</guid></item><item><title><![CDATA[New comment by tiraniddo in "FF Sandbox Escape"]]></title><description><![CDATA[
<p>It’s an proof of concept exploit for a vulnerability in the sandbox used by FF which is a security boundary to reduce the impact of RCE. The reason for the injection is I don’t just have a working RCE lying around (we get them fixed) and using one would add additional complications and obfuscate the bug when reporting. The purpose of a proof of concept is to demonstrate impact so that it can be fixed.</p>
]]></description><pubDate>Fri, 19 Jun 2020 08:25:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=23572324</link><dc:creator>tiraniddo</dc:creator><comments>https://news.ycombinator.com/item?id=23572324</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23572324</guid></item><item><title><![CDATA[New comment by tiraniddo in "What a one line change did to the Chrome sandbox"]]></title><description><![CDATA[
<p>In Chromium we do have integration tests for the sandbox functionality as a whole and unit testing but it doesn't cover things like this as we're testing Chromium's ability to sandbox not whether the OS's primitives have broken. We might notice if all of a sudden our sandbox stopped working, but for something which only exhibits a problem when it's being actively circumvented we won't.<p>I can't speak to what MS do testing wise, considering the age of some of this code it seems likely there's no test for this specific functionality otherwise you'd assume it would have been noticed. Testing for security defects is inherently difficult anyway, especially logical flaws where you don't get a nice crash. This case is different but in general you usually need some specific setup process to get the system into a vulnerable state which is hard to achieve without knowing ahead of time the bug you were trying to detect.</p>
]]></description><pubDate>Thu, 23 Apr 2020 13:52:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=22955964</link><dc:creator>tiraniddo</dc:creator><comments>https://news.ycombinator.com/item?id=22955964</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22955964</guid></item><item><title><![CDATA[New comment by tiraniddo in "What a one line change did to the Chrome sandbox"]]></title><description><![CDATA[
<p>Basically my PoC works exactly the same from Chrome GPU as FF Content Level 5 [1] there was no additional hardening. It was also easier to test as FF doesn't enable the Microsoft DLL signing mitigation should I could just do a direct CreateRemoteThread -> LoadLibrary without messing with KnownDlls.<p>[1] <a href="https://wiki.mozilla.org/Security/Sandbox" rel="nofollow">https://wiki.mozilla.org/Security/Sandbox</a></p>
]]></description><pubDate>Thu, 23 Apr 2020 12:11:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=22955073</link><dc:creator>tiraniddo</dc:creator><comments>https://news.ycombinator.com/item?id=22955073</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22955073</guid></item><item><title><![CDATA[New comment by tiraniddo in "What a one line change did to the Chrome sandbox"]]></title><description><![CDATA[
<p>Ah I see what you mean :-) We'll yes I left out the RCE as I'm not an RCE person, I look for sandbox escapes and privilege escalation bugs. The injection of a DLL is to test rather than as an exploit.<p>I was originally going to write about using the same bug in Firefox. The default content sandbox in FF is basically the same as Chrome GPU, so any untrusted HTML/JS coming from the web could exploit RCE to get into a sandboxed process where this bug could be used. I decided considering they're using the Chromium sandbox code it really should be about Chrome.<p>That said, this sandbox escape isn't being presented for practical reasons. It'd be incredibly noisy to do and potentially unreliable due to the various mitigations you have to circumvent. Any "real" attacker would likely use an exploit in the kernel's WIN32K component which is accessible from GPU.</p>
]]></description><pubDate>Thu, 23 Apr 2020 10:42:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=22954539</link><dc:creator>tiraniddo</dc:creator><comments>https://news.ycombinator.com/item?id=22954539</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22954539</guid></item><item><title><![CDATA[New comment by tiraniddo in "What a one line change did to the Chrome sandbox"]]></title><description><![CDATA[
<p>You can bet I'm salty. I do Windows research and I am a owner of the Chromium Windows sandbox code so I have a vested interest in this.<p>The problem with dealing with Windows and by extension Microsoft is there's no way of inspecting what they've changed from version to version other than by RE or having test cases. However, we try and avoid writing unit tests for behaviors Microsoft's responsible for, but of course in many cases MS don't have those tests either so these things fall through the cracks.</p>
]]></description><pubDate>Thu, 23 Apr 2020 10:06:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=22954372</link><dc:creator>tiraniddo</dc:creator><comments>https://news.ycombinator.com/item?id=22954372</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22954372</guid></item><item><title><![CDATA[New comment by tiraniddo in "What a one line change did to the Chrome sandbox"]]></title><description><![CDATA[
<p>I'm not sure which critical parts I've left out unless you mean a full working POC? The fun is reimplementing :-)</p>
]]></description><pubDate>Thu, 23 Apr 2020 10:01:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=22954351</link><dc:creator>tiraniddo</dc:creator><comments>https://news.ycombinator.com/item?id=22954351</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22954351</guid></item><item><title><![CDATA[New comment by tiraniddo in "Windows Exploitation Tricks: Spoofing Named Pipe Client PID"]]></title><description><![CDATA[
<p>I'm not sure why I'm replying to the proverbial as you seem to have made up your mind, but being the original author of the blog post I thought I'd at least try and correct some seeming misconceptions.<p>First off, the reason it's called "Windows Exploitation Tricks" is it's a blog post series ([1], [2], [3], [4]) of behaviors/tricks of the Windows OS that allow you to exploit security vulnerabilities, specifically logical privilege escalation vulnerabilities. If you read the introduction to [1] it outlines the purpose of the series, it's based on ways of exploiting real world vulnerabilities that I've discovered in real software whether it be in core Windows or third-parties. The rationale for writing them up is if you look for exploitation techniques and tricks on any platform almost everything you'll find it based around memory corruption, I don't look for fuzzed bugs so having a cool ROP chain is going to be much help to me and no doubt others who find themselves in this situation. So I write up interesting techniques I've discovered over my years of research to the benefit of others.<p>There are secondary benefits to blogging about these techniques, for example it can act as developer education. If you look at the API referenced in the blog [5], you'll not see any security warning or advice associated with it. This leads developers to misuse the functionality without understanding how the OS works. The irony is not lost on AV vendors having no clue about the security principles of the OS they're protecting from security threats. Still if you've never seen a program using the PID (through whatever means it's got that value) being used for authentication on Windows or any other OS then I can only assume you've never really looked very hard for logical vulnerabilities.<p>Another benefit is an aid to reporting. What I blog about in the series are not security issues in a traditional sense, instead they're chain building 'gadgets'. You might have a root vulnerability but not the means of exploiting it. In an ideal world a vendor would remove all non-essential functionality which could facilitate exploitation but we live in the real world and MS are not generally going to spend their time fixing something like this as a real security issue with a CVE etc. Therefore there's no real reporting process for me to follow to report it and demonstrate impact to MS, and as is typical if I find instances of the bug class which can be exploited with the trick they'll fix the reported bug, not the technique. However by making it very public it gets noticed by MS, for example [1] and [2] are both now fix/mitigated in the Windows 10 1903 in direct response to the blog posts.<p>Finally I think you don't fully understood the scope of the example vulnerability I gave. The root cause of the Check Point bug is the service 100% trusted that the PID being passed from the named pipe was a useful piece of information to base a local security decision on (see end of the "Interacting with the Service" section). It used that PID as the start of a chain of checks to determine if the process at the other side of the pipe was a Check Point trusted application. The fact that in this case the whole logic of the check was fundamentally flawed is irrelevant for the purposes of the blog post. If their certificate checks had been completely robust and it wasn't possible to either spoof them or just inject a DLL then spoofing the PID would absolutely have allowed you to exploit that vulnerability.<p>[1] <a href="https://googleprojectzero.blogspot.com/2017/08/windows-exploitation-tricks-arbitrary.html" rel="nofollow">https://googleprojectzero.blogspot.com/2017/08/windows-explo...</a>
[2] <a href="https://googleprojectzero.blogspot.com/2018/04/windows-exploitation-tricks-exploiting.html" rel="nofollow">https://googleprojectzero.blogspot.com/2018/04/windows-explo...</a>
[3] <a href="https://googleprojectzero.blogspot.com/2018/08/windows-exploitation-tricks-exploiting.html" rel="nofollow">https://googleprojectzero.blogspot.com/2018/08/windows-explo...</a>
[4] <a href="https://googleprojectzero.blogspot.com/2019/04/windows-exploitation-tricks-abusing.html" rel="nofollow">https://googleprojectzero.blogspot.com/2019/04/windows-explo...</a>
[5] <a href="https://docs.microsoft.com/en-us/windows/win32/api/winbase/nf-winbase-getnamedpipeclientprocessid" rel="nofollow">https://docs.microsoft.com/en-us/windows/win32/api/winbase/n...</a></p>
]]></description><pubDate>Mon, 07 Oct 2019 02:18:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=21176760</link><dc:creator>tiraniddo</dc:creator><comments>https://news.ycombinator.com/item?id=21176760</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21176760</guid></item><item><title><![CDATA[New comment by tiraniddo in "A Kernel Engineer at Microsoft's Answer to “What Do You Think about ReactOS?”"]]></title><description><![CDATA[
<p>The private symbols have in the past ended up on the public symbol server (and quickly taken down), they have ending up "shipping" in public symbol packs. I can't point to specific incidents as the links to them no longer exist. This is why I said accidentally as they were not released as a conscious effort on MS's part.<p>However you seem to want to claim the only place those symbols can come from is being stolen. Of course in this case you use leak as a synonym for stolen, bit leak can just as much mean they were released accidentally by the owner, MS can't steal their own private symbols and release them on the web. I'm sure there's some symbol files traded in private scenarios which are actually taken through non public means but there have been actual incidences of public release of private symbols.<p>I'm not trying to claim that ReactOS is clean, I have no skin in the game from a project or user perspective. For all I know it might have lifted significant portions of its code from stolen source code or the WRK (which isn't stolen in so much as used without permission, which I'd regard as a totally different thing). I do however take exception to the typical software engineer's view there are somethings which cannot be reverse engineered into a almost similar form.<p>As to why ReactOS is stuck in the early 2000s, it could be because of all the source code which was stolen and put wholesale into the project. Although if that was the case I'd have expect MS would have sued the living shit of the project by now. It could also be because Windows was and is a very complex OS with many layers which if you're trying to re-implement with a team of 10s to 100s versus 1000s it's going to take a lot of time. It's seems unlikely that the project would spend the millions of man hours to create the abomination that is UWP.<p>Perhaps the best way to determine if ReactOS is unclean is for MS to open source the Windows Kernel, hell why would you even need ReactOS then :-)<p>edit: Cleanup.</p>
]]></description><pubDate>Wed, 03 Jul 2019 10:06:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=20343007</link><dc:creator>tiraniddo</dc:creator><comments>https://news.ycombinator.com/item?id=20343007</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20343007</guid></item><item><title><![CDATA[New comment by tiraniddo in "A Kernel Engineer at Microsoft's Answer to “What Do You Think about ReactOS?”"]]></title><description><![CDATA[
<p>Well that's categorically untrue. Sure they don't release private symbols intentionally but they have done in the past accidentally. At that point it becomes a bit of a grey area, undoubtedly leaked/stolen source code is a no-no but reversing from private symbols when they do leak seem harder to quantify as you still need to reverse engineer the code, just structures/names etc are already known.<p>Private symbols are not the only way of gleaning more information, other examples I can think of are:<p>* Checked builds (prior to Win10). These builds shipped de-optimized kernels (e.g. no inlines) typically with copious debug strings which gave away important details. For example I gleaned a lot of knowledge of ALPC MSRPC from the checked build of rpcrt4.dll from Windows 8.<p>* SDK/DDK headers, especially in the brave new world of insider previews with preview SDK/DDKs there is sometimes information present which should not have been released including "private" information. Again bit of a grey area.<p>* The private symbols MS do ship. For example a significant proportion of the COM runtime has private symbols, intentionally. You can extract from those a surprising amount of system call structure information.<p>I'd recommend watching Alex Ionescu's talk at OffensiveCon about how he does reverse engineering on Windows to see many of these things in action. <a href="https://www.youtube.com/watch?v=2D9ExVc0G10" rel="nofollow">https://www.youtube.com/watch?v=2D9ExVc0G10</a><p>I'm not saying any of this would make it a clean-room re-implementation but to say ReactOS cannot possibly have been reverse engineered without just up and copying source isn't true.<p>edit: Formatting.</p>
]]></description><pubDate>Wed, 03 Jul 2019 08:33:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=20342631</link><dc:creator>tiraniddo</dc:creator><comments>https://news.ycombinator.com/item?id=20342631</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20342631</guid></item><item><title><![CDATA[New comment by tiraniddo in "I tried creating a web browser, and Google blocked me"]]></title><description><![CDATA[
<p>No, blame the movie studios, record labels etc. They're the one which require asinine DRM support for web browsers. Google/Microsoft/Apple/Adobe want to support media content, but to do so requires towing the line with the media companies otherwise they refuse to license the content (at least in HD+).<p>Having worked with various DRM teams I know that they have to treat their code as if its the most secret code in the world, if they don't the media companies can swoop in and ban them and then no Netflix for your users. This is why Widevine code isn't open source (other than the glue EME code) and is almost certainly the reason for the refusal to work with a small open-source form of Chromium. If for example the project was used to "steal" content the media companies would be mad at Widevine, with lasting repercussions for all Chrome users.<p>It's worth noting that typically all DRM teams work as if the hosting environment is an adversary. For example Widevine don't trust anything Chrome says as someone could recompile it and lie about the security. The only times this is relaxed is where the platform is deemed secure, such as CrOS or iOS.</p>
]]></description><pubDate>Tue, 02 Apr 2019 15:21:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=19555060</link><dc:creator>tiraniddo</dc:creator><comments>https://news.ycombinator.com/item?id=19555060</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19555060</guid></item><item><title><![CDATA[New comment by tiraniddo in "Oracle plans to dump risky Java serialization"]]></title><description><![CDATA[
<p>Yes it’s just as vulnerable (example [1]), but I think .net serialization is exposed less often to untrusted inputs than Java with its myriad of enterprise software.<p>[1] <a href="https://googleprojectzero.blogspot.co.uk/2017/04/exploiting-net-managed-dcom.html" rel="nofollow">https://googleprojectzero.blogspot.co.uk/2017/04/exploiting-...</a><p>Full disclosure, I’m the author of that blog post.</p>
]]></description><pubDate>Mon, 28 May 2018 09:13:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=17171441</link><dc:creator>tiraniddo</dc:creator><comments>https://news.ycombinator.com/item?id=17171441</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=17171441</guid></item><item><title><![CDATA[New comment by tiraniddo in "Unicode is hard"]]></title><description><![CDATA[
<p>It's worth noting that ALT+X gives you the default OEM code page for compatibility with DOS <i>sigh</i> whereas ALT+0X gives you Unicode. So typing ALT+0163 will give you £.</p>
]]></description><pubDate>Tue, 30 May 2017 12:41:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=14444842</link><dc:creator>tiraniddo</dc:creator><comments>https://news.ycombinator.com/item?id=14444842</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14444842</guid></item><item><title><![CDATA[A Powershell Script Demonstrating Why Windows UAC Had Zero Security from Day 1]]></title><description><![CDATA[
<p>Article URL: <a href="https://gist.github.com/tyranid/9ffef5962a642d4a1bb8e4ee7e3bebc5">https://gist.github.com/tyranid/9ffef5962a642d4a1bb8e4ee7e3bebc5</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=14440562">https://news.ycombinator.com/item?id=14440562</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 29 May 2017 18:25:16 +0000</pubDate><link>https://gist.github.com/tyranid/9ffef5962a642d4a1bb8e4ee7e3bebc5</link><dc:creator>tiraniddo</dc:creator><comments>https://news.ycombinator.com/item?id=14440562</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14440562</guid></item><item><title><![CDATA[New comment by tiraniddo in "Classic NES Series Anti-Emulation Measures"]]></title><description><![CDATA[
<p>I'd take a guess that the save tricks might be more anti piracy. After all the gba had flash carts, perhaps these carts contained sram and eeprom so checking for it was to block it. No idea about the pipeline stuff though, perhaps checking vram was working correctly?</p>
]]></description><pubDate>Wed, 01 Feb 2017 22:34:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=13546067</link><dc:creator>tiraniddo</dc:creator><comments>https://news.ycombinator.com/item?id=13546067</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13546067</guid></item><item><title><![CDATA[New comment by tiraniddo in "Ln – NTFS hard/symbolic link command line tool"]]></title><description><![CDATA[
<p>Well at least with hard links that's not strictly true. Using official win32 apis you need write permission on the file you're linking to so you can't link to say a system file as a non admin. Try mklink with the /H switch.<p>Of course that's a bit of a lie, if you use the NtSetInformationFile api you don't need write access :-)</p>
]]></description><pubDate>Tue, 06 Dec 2016 10:53:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=13113686</link><dc:creator>tiraniddo</dc:creator><comments>https://news.ycombinator.com/item?id=13113686</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13113686</guid></item><item><title><![CDATA[New comment by tiraniddo in "Breaking the Chain"]]></title><description><![CDATA[
<p>That's exactly it. The contact had flash source but they get the DRM code shipped as a binary library so never see the source of it. A lot of companies, MS, Google, Adobe compartmentalise their drm team, effectively at the behest of the media companies as its all smoke and mirrors anyway. trying to protect things like encryption keys and the like. Typically therefore the binaries are also obfuscated heavily.</p>
]]></description><pubDate>Tue, 29 Nov 2016 23:32:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=13067158</link><dc:creator>tiraniddo</dc:creator><comments>https://news.ycombinator.com/item?id=13067158</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=13067158</guid></item><item><title><![CDATA[New comment by tiraniddo in "Unsafe at any clock speed: Linux kernel security needs a rethink"]]></title><description><![CDATA[
<p>I think you're also missing the point that adding mitigations into a platform is about reducing the number of exploitable bugs and ideally making the ones which are still exploitable take more time, are less reliable and cost more. I think this fits the car safety analogy pretty well.<p>If you want to think of this in the car safety analogy then consider all possible ways of killing someone in a car before and after the changes in safety standards. In the bad old days random events could kill you but if you had a targeted attacker they could use the same techniques and just drive a car into you, or force you into a wall. Now with newer safety standards the chance that a random event would kill you is much reduced, but the targeted attacker (assuming they don't just fire a bunker buster at you) needs to spend time researching the type of car, finding weak points, developing something to exploit those weak points etc.<p>So it goes with exploit mitigations. It wasn't that long ago that running a fuzzer on a product (and sadly fuzzers are still useful) would yield a massive amount of trivially exploitable bugs. These days, not as much, at least in mature platforms. You could think of the fuzzer discovered "random" bugs to be the case exploit mitigations are trying to protect against (re random collisions which car safety protect against). Even the simplest stuff like stack cookies make exploitation significantly harder. Are there no stack overflow bugs? Nope they still exist. Are they completely unexploitable? Nope, especially in the hands of a skilled attacker. Are you protected against randomly introduced bugs which cause a stack overflow and have a low chance of having some useful behaviour which makes them exploitable? Absolutely.<p>Honestly if someone _wants_ to _kill_ you I'm sure they could. If the attacker is willing to spend the time, effort and money to find better, more exploitable bugs and you're a target worthy of their efforts then you're screwed no matter what exploit mitigations you put in place (this is why imo bug hunting still has some semblance of value). But are you _that_ important? Would the FBI be willing to a throw a $1m iOS exploit at you for example?</p>
]]></description><pubDate>Wed, 28 Sep 2016 08:40:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=12596236</link><dc:creator>tiraniddo</dc:creator><comments>https://news.ycombinator.com/item?id=12596236</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=12596236</guid></item></channel></rss>