Hacker News new | past | comments | ask | show | jobs | submit login

You're arguing that memory corruption is a worse vulnerability, which is true, but doesn't contradict the claim that the NSA could exploit this vulnerability to intercept traffic and add Apple devices to PRISM. So ultimately you fail to demonstrate that Gruber's post is "silly".



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: