Hacker News new | past | comments | ask | show | jobs | submit login

> How many binary exploits have actually lead to the exposing your personal information?

It happens with some frequency. WhatsApp was exploited due to a memory safety vulnerability, for example. Chrome 0days for memory unsafe vulns are definitely exploited in the wild.

Typically companies have much much larger attack surface, so a technique like phishing is going to be far cheaper to execute. But even still, I've seen a memory safety vulnerability used in an attack against a company.

The thing is that most companies' attack surface isn't in C/C++ because... that would suck, so they don't do it. Or if they do they use a specific codebase that's been heavily invested in over decades and they sandbox and isolate the services.

So on the one hand, yes, most attacks on companies are not due to memory safety issues but that's in part because of the investments into memory safety.

> I remember individuals getting pwned very frequently in the old days.

Yep, significant efforts were made to make the internet a safer place. Primarily the sandboxing and disabling of third party plugins in browsers.

But this doesn't really matter. Yes, there are other issues like phishing and those are being addressed with other techniques. There are issues like sql injection and those are also being addressed. That doesn't mean that memory safety isn't an issue.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: