Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Indeed, the most impressive part of this is that it's actually half a dozen different exploits carefully chained together to produce the final result. I can't even imagine the amount of perseverance required for each single sub-exploit. Mad props.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: