I’m in awe of these guys finding these previously unknown exploits. How in the world do they do it? I think it would be like looking for a single needle in 10,000 haystacks.
Operating system internals expert