TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

10 Lessons From The Pwn2Own Hacker Contest

3 pointsby r11tabout 15 years ago

2 comments

rfreyabout 15 years ago
"Despite the survival of Google Chrome and the fall of Internet Explorer 8 (running on Windows 7), all the browser hackers at the contest maintained that Microsoft's browser is by far the most difficult to exploit. For starters, IE 8 is the only browser to fully -- and properly -- implement ASLR (see explanation from Nils)"
prodigal_erikabout 15 years ago
I blame reckless use of native code. Would a browser within a bounds-checked typesafe VM have any of these flaws?