Chapter

Improvements in Vendor Participation at Pwn2Own Over the Years
listen on Spotify
22:54 - 29:05 (06:11)

The Pwn2Own contest has seen better vendor participation over the years, leading to improvements in security measures like sandbox and rendering engines in browsers. An example of an interesting Pwn2Own exploit is the IE exploit that forced the browser to open the on-screen keyboard and execute commands on the operating system.

Clips
The vendors who were reluctant to be part of Pwn2Own initially have now started valuing the conference and sponsoring it.
22:54 - 29:05 (06:11)
listen on Spotify
Pwn2Own
Summary

The vendors who were reluctant to be part of Pwn2Own initially have now started valuing the conference and sponsoring it. Research community involvement & data analysis has helped vendors significantly improve their product's security.

Chapter
Improvements in Vendor Participation at Pwn2Own Over the Years
Episode
82: Master of Pwn
Podcast
Darknet Diaries