"Because Symantec uses a filter driver to intercept all system I/O, just emailing a file to a victim or sending them a link to an exploit is enough to trigger it - the victim does not need to open the file or interact with it in anyway." — Worse than that. Apparently,Tavis emailed the exploit to Symantec in a password protected zip file. He included the password in the body of the email. The email server, running Symantec, grabbed the password out of the email, decrypted the zip file, and upon reading the exploit code, crashed itself. https://news.ycombinator.com/item?id=11998961
вторая часть, похоже, апокриф, но очень смешно ‎· let's have each other with cream
(последние два слова должны были быть "became enlightened"!) ‎· 9000
^ #likecomm ‎· 50% ash
вторая часть - это первый комментарий этого Тревиса в багтрекере: https://bugs.chromium.org/p/project-zero/issues/detail?id=820 ‎· newtover
ну он это предположил, нет свидетельства из Симантека ‎· let's have each other with cream