More on this book
Community
Kindle Notes & Highlights
by
Kim Zetter
Read between
July 20, 2018 - March 17, 2019
Although governments still produce their own exploits—the NSA employs teams for this—they also outsource to other firms because the demand for exploits has grown, as has the cost of producing them: two or three years ago, a single vulnerability was sufficient to gain root-level access to a machine. But today, it can take multiple ones to bypass security protections to achieve the same results.

