Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> Yeah, JS is the only hairy part. I considered mentioning it, since I know it was going to come up. But luckily, all I've seen so far are basic demos (like leaky.page) that read data from a carefully-crafted array that the page itself populated.

Only PoC says very little. If I were head of a nation state APT I'd look into exploiting this because attack surface of JS is high. I'd only use it targeted, for example on Microsoft Azure team as outlined in Darknet Diaries #78.



If a nation state wants to hack into my computer, I have absolute confidence they will succeed. They are not a part of my personal threat model.


If they’re targeting me in particular, I agree.

If they’re targeting Joe and Jane Average, the long history of government tech procurement failures means I expect them to fail — fail dangerously, but fail.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: