If you are curious how secure this is find out for yourself. Azure Sphere has a great bounty program https://www.microsoft.com/en-us/msrc/bounty-microsoft-azure …https://twitter.com/galen_hunt/status/1329174873747320832 …
-
Show this thread
-
Research is a little harder than tweeting your opinion though ;)
1 reply 1 retweet 5 likesShow this thread -
-
Replying to @jonasLyk @dwizzzleMSFT
i mean- its easier for me to find an EOP in windows 10 then to do a " tik tåk" or whatever it is the young generation use for making us elderly look like senile retards. So- yarh, if the platform is tik tåk vs win 10 I know what i would rather do
1 reply 0 retweets 1 like -
Replying to @jonasLyk
I mean the attack surface is totally different so I’m not sure your point
1 reply 0 retweets 0 likes -
Replying to @dwizzzleMSFT
By slashing the bug bounty program there is no incentive to help you constantly improove it- we would basicly be working for free. And the new amounts are pretty much the same as slashing- especially when all major classes of vulnerabilities are for some reason not eligible
1 reply 0 retweets 1 like -
Replying to @jonasLyk @dwizzzleMSFT
And I still on average stumble upon 1 way to trigger blue screen off death each month.... Or a way to corrupt any NTFS partition as unpriveleged user by just opening a file. or cause all kernelAPCs to deadlock so hard it cant even turn blue. all triggerable as unpriv by fileopen
1 reply 0 retweets 3 likes
this months find was though a bit special as its apperently remotely triggerable- you do need to have permission to create a file though , the \users\public or \users\guest folder are fine though.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.