← Back to context Comment by notpublic 19 hours ago What is the proper way to disclose evidence for this class of hacking? 1 comment notpublic Reply cosmosgenius 19 hours ago Starting with an isolated POC showing the vector being exploited would help. I like gooogle project zero mainly for this.
cosmosgenius 19 hours ago Starting with an isolated POC showing the vector being exploited would help. I like gooogle project zero mainly for this.
Starting with an isolated POC showing the vector being exploited would help. I like gooogle project zero mainly for this.