Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

>Android has inherited all of that and it's by far the shittiest mobile OS out there in terms of how easy it is to own.

Then why don't you try? Google has $200,000 USD waiting for you to exploit a fully patched Pixel. Or are you too rich to make it worth your while? If you're going to say something that silly at least have the technical prowess to walk the talk.




First, is there a point that you are trying to make because I didn't see any.

Second, 200k USD for a vulnerability of such caliber is peanuts.

Third, you must have missed this: http://blog.trendmicro.com/results-mobile-pwn2own-2016/


I think my point is pretty clear - your comments regarding the state of Android security are very lacking. I suggest you watch this video by Adrian Ludwig at Next 2017 for an overview:

https://www.youtube.com/watch?v=Zm6ziX5pqt8

>Second, 200k USD for a vulnerability of such caliber is peanuts.

I think that's the going rate offered by companies that buy exploits like Zerodium. Do you know of a company offering a better price?

>Third, you must have missed this: http://blog.trendmicro.com/results-mobile-pwn2own-2016/

First, the hack was impressive because of all of the exploits they had to chain. Perhaps this gives you an understanding of just how difficult it really is and why I called your comments regarding Android security silly. Secondly, I don't believe their hack was possible via RCE and needed physical access to the device. Third, you neglected to mention that not only was the iPhone hacked, but it was done so twice. Additionally, the 2 iPhone hacks earned more money than the Nexus 6P hack. Did you also want to comment on the state of iOS security?


You have little understanding of this space, as evident by your comments re: Zerodium. Allow me to inform you that there are plenty of buyers that are willing to pay top dollar for such exploits, as are plenty of people that keep such exploits to themselves or sell them to buyers that will not disclose them.

None of that takes place in the public eye, but of course one can figure some of it out if one pays attention. In some cases, one can also extrapolate what the state of this "underground" is by examining the research that does become public.


I could care less about the value of exploits on the black market. It is interesting, though, that someone that claims to have an understanding of the underground value of these exploits is unaware of just how complex it is to first find these exploits and then chain them together in order for them to work successfully.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: