well, we all know these gimmicks are not about protecting users, or a realistic mitigation would have been provided.
An attacker needs to perform additional VR to find the bug based on what they described, and then write an exploit.
-
-
That's not an overnight thing in this case. If you have the skills to do this, you have the skills to find other 0day.
-
indeed but you make it a LOT easier for them.
- 5 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.