this post was submitted on 03 Aug 2023
1390 points (99.2% liked)
Technology
59582 readers
2667 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Typically low level attacks such as these is where it starts because they grant access to parts that can be used to learn more about the system as a whole.
This understanding then can be used to find easier to exploit avenues.
A good example of this is the history of exploits on Nintendo hardware.
They almost all started with finding an exploit at the hardware level, which then subsequently lead to finding software exploits and ways to leverage them in an easy way for end users.
That's interesting. In a world where everything runs webkit, I thought it would work the other way around.