I remember reading somewhere that hardcore foreign teams stopped going to pwn2own once they realized that they were<p>1) effectively disclosing valuable zero days in a dark room
2) to the tagert manufacturer
3) and the pwn2own organizer who happens to be indirectly sponsored by the NSA<p>In exchange for what is pretty much just kudos and pocket change
Interesting that they didn't mention in the summary that exploits were found for both a Samsung Galaxy and a Tesla head unit.<p>What type of knowledge do these people have? Networking? File systems? Linux kernels? How do they get started?