←back to thread

265 points fortran77 | 1 comments | | HN request time: 0.21s | source
Show context
alphabetting ◴[] No.42190173[source]
>The vulnerabilities, credited to Google’s TAG (Threat Analysis Group)

Do they find these by monitoring the brokers of zero days or analyzing devices of people who are being targeted?

replies(4): >>42190208 #>>42190296 #>>42190299 #>>42192485 #
1. xorcist ◴[] No.42192485[source]
Both, but also a lot of original research. They are public about this.