←back to thread

262 points fortran77 | 1 comments | | HN request time: 0.206s | source
Show context
alphabetting ◴[] No.42190173[source]
>The vulnerabilities, credited to Google’s TAG (Threat Analysis Group)

Do they find these by monitoring the brokers of zero days or analyzing devices of people who are being targeted?

replies(4): >>42190208 #>>42190296 #>>42190299 #>>42192485 #
1. wutwutwat ◴[] No.42190208[source]
little of column a, little of column b

they also have insane peering and backbone network infra, run one of the largest cloud providers, host basically everyone's email, documents, and file storage, chat, app store, and have a native browser installed

I'm sure they have many different signals they can look at to see compromised type behavior differing from the profile they have on you